WorldWideScience

Sample records for hidden assumptions defines

  1. Killing and letting die: hidden value assumptions.

    Science.gov (United States)

    Atkinson, G

    1983-01-01

    In this paper I argue for several related theses: first, that the distinction between killing and letting die, as it is drawn by ordinary persons in ordinary contexts, is more complex than is generally understood; second, that the key feature of this complexity lies in the presence of a hidden normative component in what appears to be a straightforwardly descriptive distinction; and, third, that this complexity renders the killing/letting die distinction an inadequate and hazardous guide for moral reasoning.

  2. A Proposal for Testing Local Realism Without Using Assumptions Related to Hidden Variable States

    Science.gov (United States)

    Ryff, Luiz Carlos

    1996-01-01

    A feasible experiment is discussed which allows us to prove a Bell's theorem for two particles without using an inequality. The experiment could be used to test local realism against quantum mechanics without the introduction of additional assumptions related to hidden variables states. Only assumptions based on direct experimental observation are needed.

  3. The "invention" of lesbian acts in Iran: interpretative moves, hidden assumptions, and emerging categories of sexuality.

    Science.gov (United States)

    Bucar, Elizabeth M; Shirazi, Faegheh

    2012-01-01

    This article describes and explains the current official status of lesbianism in Iran. Our central question is why the installation of an Islamic government in Iran resulted in extreme regulations of sexuality. The authors argue that rather than a clear adoption of "Islamic teaching on lesbianism," the current regime of sexuality was "invented" through a series of interpretative moves, adoption of hidden assumptions, and creation of sexual categories. This article is organized into two sections. The first sets the scene of official sexuality in Iran through a summary of (1) the sections of the Iranian Penal code dealing with same-sex acts and (2) government support for sexual reassignment surgeries. The second section traces the "invention" of a dominant post-revolutionary Iranian view of Islam and sexuality through identifying a number of specific interpretive moves this view builds on.

  4. Behavioral manifestations of audiometrically-defined "slight" or "hidden" hearing loss revealed by measures of binaural detection.

    Science.gov (United States)

    Bernstein, Leslie R; Trahiotis, Constantine

    2016-11-01

    This study assessed whether audiometrically-defined "slight" or "hidden" hearing losses might be associated with degradations in binaural processing as measured in binaural detection experiments employing interaurally delayed signals and maskers. Thirty-one listeners participated, all having no greater than slight hearing losses (i.e., no thresholds greater than 25 dB HL). Across the 31 listeners and consistent with the findings of Bernstein and Trahiotis [(2015). J. Acoust. Soc. Am. 138, EL474-EL479] binaural detection thresholds at 500 Hz and 4 kHz increased with increasing magnitude of interaural delay, suggesting a loss of precision of coding with magnitude of interaural delay. Binaural detection thresholds were consistently found to be elevated for listeners whose absolute thresholds at 4 kHz exceeded 7.5 dB HL. No such elevations were observed in conditions having no binaural cues available to aid detection (i.e., "monaural" conditions). Partitioning and analyses of the data revealed that those elevated thresholds (1) were more attributable to hearing level than to age and (2) result from increased levels of internal noise. The data suggest that listeners whose high-frequency monaural hearing status would be classified audiometrically as being normal or "slight loss" may exhibit substantial and perceptually meaningful losses of binaural processing.

  5. Optical Test of Local Hidden-Variable Model

    Institute of Scientific and Technical Information of China (English)

    WU XiaoHua; ZONG HongShi; PANG HouRong

    2001-01-01

    An inequality is deduced from local realism and a supplementary assumption. This inequality defines an experiment that can be actually performed with the present technology to test local hidden-variable models, and it is violated by quantum mechanics with a factor 1.92, while it can be simplified into a form where just two measurements are required.``

  6. A step-indexed Kripke model of hidden state via recursive properties on recursively defined metric spaces

    DEFF Research Database (Denmark)

    Birkedal, Lars; Schwinghammer, Jan; Støvring, Kristian

    2010-01-01

    for Chargu´eraud and Pottier’s type and capability system including frame and anti-frame rules, based on the operational semantics and step-indexed heap relations. The worlds are constructed as a recursively defined predicate on a recursively defined metric space, which provides a considerably simpler...

  7. How Hidden Can Be Even More Hidden?

    CERN Document Server

    Fraczek, Wojciech; Szczypiorski, Krzysztof

    2011-01-01

    The paper presents Deep Hiding Techniques (DHTs) that define general techniques that can be applied to every network steganography method to improve its undetectability and make steganogram extraction harder to perform. We define five groups of techniques that can make steganogram less susceptible to detection and extraction. For each of the presented group, examples of the usage are provided based on existing network steganography methods. To authors' best knowledge presented approach is the first attempt in the state of the art to systematically describe general solutions that can make steganographic communication more hidden and steganogram extraction harder to perform.

  8. The Hidden Strand of Mathematical Proficiency: Defining and Assessing for Productive Disposition in Elementary School Teachers' Mathematical Content Knowledge

    Science.gov (United States)

    Siegfried, John Zig Michael

    2012-01-01

    Teachers' mathematical content knowledge is one of the most important constructs considered by researchers studying elementary mathematics education (Fennema & Franke, 1992). One component of mathematical content knowledge that is complicated, ill-defined, and oft-ignored is "productive disposition," defined as the…

  9. Hidden loss

    DEFF Research Database (Denmark)

    Kieffer-Kristensen, Rikke; Johansen, Karen Lise Gaardsvig

    2013-01-01

    to participate. RESULTS: All children were affected by their parents' ABI and the altered family situation. The children's expressions led the authors to identify six themes, including fear of losing the parent, distress and estrangement, chores and responsibilities, hidden loss, coping and support. The main...... the ill parent. These findings contribute to a deeper understanding of the traumatic process of parental ABI that some children experience and emphasize the importance of family-centred interventions that include the children....

  10. Hidden Variables or Positive Probabilities?

    CERN Document Server

    Rothman, T; Rothman, Tony

    2001-01-01

    Despite claims that Bell's inequalities are based on the Einstein locality condition, or equivalent, all derivations make an identical mathematical assumption: that local hidden-variable theories produce a set of positive-definite probabilities for detecting a particle with a given spin orientation. The standard argument is that because quantum mechanics assumes that particles are emitted in a superposition of states the theory cannot produce such a set of probabilities. We examine a paper by Eberhard who claims to show that a generalized Bell inequality, the CHSH inequality, can be derived solely on the basis of the locality condition, without recourse to hidden variables. We point out that he nonetheless assumes a set of positive-definite probabilities, which supports the claim that hidden variables or "locality" is not at issue here, positive-definite probabilities are. We demonstrate that quantum mechanics does predict a set of probabilities that violate the CHSH inequality; however these probabilities ar...

  11. In the Minds of OSCE Examiners: Uncovering Hidden Assumptions

    Science.gov (United States)

    Chahine, Saad; Holmes, Bruce; Kowalewski, Zbigniew

    2016-01-01

    The Objective Structured Clinical Exam (OSCE) is a widely used method of assessment in medical education. Rater cognition has become an important area of inquiry in the medical education assessment literature generally, and in the OSCE literature specifically, because of concerns about potential compromises of validity. In this study, a novel…

  12. Hidden assumptions in the derivation of the theorem of Bell

    NARCIS (Netherlands)

    Hess, Karl; De Raedt, Hans; Michielsen, Kristel

    2012-01-01

    John Bell's inequalities have already been considered by Boole in 1862. Boole established a one-to-one correspondence between experimental outcomes and mathematical abstractions of his probability theory. His abstractions are two-valued functions that permit the logical operations AND, OR and NOT an

  13. Helioscope bounds on hidden sector photons

    Energy Technology Data Exchange (ETDEWEB)

    Redondo, J.

    2007-12-15

    The flux of hypothetical ''hidden photons'' from the Sun is computed under the assumption that they interact with normal matter only through kinetic mixing with the ordinary standard model photon. Requiring that the exotic luminosity is smaller than the standard photon luminosity provides limits for the mixing parameter down to {chi} hidden photon mass. Furthermore, it is pointed point out that helioscopes looking for solar axions are also sensitive to hidden photons. The recent results of the CAST collaboration are used to further constrain the mixing parameter {chi} at low masses (m{sub {gamma}}{sub '}<1 eV) where the luminosity bound is weaker. In this regime the solar hidden photon ux has a sizable contribution of longitudinally polarized hidden photons of low energy which are invisible for current helioscopes. (orig.)

  14. Helioscope bounds on hidden sector photons

    Energy Technology Data Exchange (ETDEWEB)

    Redondo, J.

    2007-12-15

    The flux of hypothetical ''hidden photons'' from the Sun is computed under the assumption that they interact with normal matter only through kinetic mixing with the ordinary standard model photon. Requiring that the exotic luminosity is smaller than the standard photon luminosity provides limits for the mixing parameter down to {chi} hidden photon mass. Furthermore, it is pointed point out that helioscopes looking for solar axions are also sensitive to hidden photons. The recent results of the CAST collaboration are used to further constrain the mixing parameter {chi} at low masses (m{sub {gamma}}{sub '}<1 eV) where the luminosity bound is weaker. In this regime the solar hidden photon ux has a sizable contribution of longitudinally polarized hidden photons of low energy which are invisible for current helioscopes. (orig.)

  15. Environment Assumptions for Synthesis

    CERN Document Server

    Chatterjee, Krishnendu; Jobstmann, Barbara

    2008-01-01

    The synthesis problem asks to construct a reactive finite-state system from an $\\omega$-regular specification. Initial specifications are often unrealizable, which means that there is no system that implements the specification. A common reason for unrealizability is that assumptions on the environment of the system are incomplete. We study the problem of correcting an unrealizable specification $\\phi$ by computing an environment assumption $\\psi$ such that the new specification $\\psi\\to\\phi$ is realizable. Our aim is to construct an assumption $\\psi$ that constrains only the environment and is as weak as possible. We present a two-step algorithm for computing assumptions. The algorithm operates on the game graph that is used to answer the realizability question. First, we compute a safety assumption that removes a minimal set of environment edges from the graph. Second, we compute a liveness assumption that puts fairness conditions on some of the remaining environment edges. We show that the problem of findi...

  16. Estimating an Activity Driven Hidden Markov Model

    OpenAIRE

    Meyer, David A.; Shakeel, Asif

    2015-01-01

    We define a Hidden Markov Model (HMM) in which each hidden state has time-dependent $\\textit{activity levels}$ that drive transitions and emissions, and show how to estimate its parameters. Our construction is motivated by the problem of inferring human mobility on sub-daily time scales from, for example, mobile phone records.

  17. Problematizing Assumptions, Examining Dilemmas, and Exploring Promising Possibilities in Culturally Relevant Pedagogy. A Response to "'I Didn't See It as a Cultural Thing': Supervisors of Student Teachers Define and Describe Culturally Responsive Supervision"

    Science.gov (United States)

    Dantas-Whitney, Maria; Ulveland, R. Dana

    2016-01-01

    In response to the study and recommendations presented in the article "I Didn't See it as a Cultural Thing," written by Linda Griffin, Dyan Watson and Tonda Liggett, we explore three interrelated topics. First, we seek to problematize some of the assumptions in the study. We review some of the authors' approaches and assertions that seem…

  18. Hidden Curriculum as One of Current Issue of Curriculum

    Science.gov (United States)

    Alsubaie, Merfat Ayesh

    2015-01-01

    There are several issues in the education system, especially in the curriculum field that affect education. Hidden curriculum is one of current controversial curriculum issues. Many hidden curricular issues are the result of assumptions and expectations that are not formally communicated, established, or conveyed within the learning environment.…

  19. Secret Codes: The Hidden Curriculum of Semantic Web Technologies

    Science.gov (United States)

    Edwards, Richard; Carmichael, Patrick

    2012-01-01

    There is a long tradition in education of examination of the hidden curriculum, those elements which are implicit or tacit to the formal goals of education. This article draws upon that tradition to open up for investigation the hidden curriculum and assumptions about students and knowledge that are embedded in the coding undertaken to facilitate…

  20. Secret Codes: The Hidden Curriculum of Semantic Web Technologies

    Science.gov (United States)

    Edwards, Richard; Carmichael, Patrick

    2012-01-01

    There is a long tradition in education of examination of the hidden curriculum, those elements which are implicit or tacit to the formal goals of education. This article draws upon that tradition to open up for investigation the hidden curriculum and assumptions about students and knowledge that are embedded in the coding undertaken to facilitate…

  1. Hidden symmetries in jammed systems

    Science.gov (United States)

    Morse, Peter K.; Corwin, Eric I.

    2016-07-01

    There are deep, but hidden, geometric structures within jammed systems, associated with hidden symmetries. These can be revealed by repeated transformations under which these structures lead to fixed points. These geometric structures can be found in the Voronoi tesselation of space defined by the packing. In this paper we examine two iterative processes: maximum inscribed sphere (MIS) inversion and a real-space coarsening scheme. Under repeated iterations of the MIS inversion process we find invariant systems in which every particle is equal to the maximum inscribed sphere within its Voronoi cell. Using a real-space coarsening scheme we reveal behavior in geometric order parameters which is length-scale invariant.

  2. Backward causation, hidden variables and the meaning of completeness

    Indian Academy of Sciences (India)

    Huw Price

    2001-02-01

    Bell’s theorem requires the assumption that hidden variables are independent of future measurement settings. This independence assumption rests on surprisingly shaky ground. In particular, it is puzzlingly time-asymmetric. The paper begins with a summary of the case for considering hidden variable models which, in abandoning this independence assumption, allow a degree of ‘backward causation’. The remainder of the paper clarifies the physical significance of such models, in relation to the issue as to whether quantum mechanics provides a complete description of physical reality.

  3. Hidden Regular Variation: Detection and Estimation

    CERN Document Server

    Mitra, Abhimanyu

    2010-01-01

    Hidden regular variation defines a subfamily of distributions satisfying multivariate regular variation on $\\mathbb{E} = [0, \\infty]^d \\backslash \\{(0,0, ..., 0) \\} $ and models another regular variation on the sub-cone $\\mathbb{E}^{(2)} = \\mathbb{E} \\backslash \\cup_{i=1}^d \\mathbb{L}_i$, where $\\mathbb{L}_i$ is the $i$-th axis. We extend the concept of hidden regular variation to sub-cones of $\\mathbb{E}^{(2)}$ as well. We suggest a procedure of detecting the presence of hidden regular variation, and if it exists, propose a method of estimating the limit measure exploiting its semi-parametric structure. We exhibit examples where hidden regular variation yields better estimates of probabilities of risk sets.

  4. Linking assumptions in amblyopia

    Science.gov (United States)

    LEVI, DENNIS M.

    2017-01-01

    Over the last 35 years or so, there has been substantial progress in revealing and characterizing the many interesting and sometimes mysterious sensory abnormalities that accompany amblyopia. A goal of many of the studies has been to try to make the link between the sensory losses and the underlying neural losses, resulting in several hypotheses about the site, nature, and cause of amblyopia. This article reviews some of these hypotheses, and the assumptions that link the sensory losses to specific physiological alterations in the brain. Despite intensive study, it turns out to be quite difficult to make a simple linking hypothesis, at least at the level of single neurons, and the locus of the sensory loss remains elusive. It is now clear that the simplest notion—that reduced contrast sensitivity of neurons in cortical area V1 explains the reduction in contrast sensitivity—is too simplistic. Considerations of noise, noise correlations, pooling, and the weighting of information also play a critically important role in making perceptual decisions, and our current models of amblyopia do not adequately take these into account. Indeed, although the reduction of contrast sensitivity is generally considered to reflect “early” neural changes, it seems plausible that it reflects changes at many stages of visual processing. PMID:23879956

  5. Testing Our Fundamental Assumptions

    Science.gov (United States)

    Kohler, Susanna

    2016-06-01

    Science is all about testing the things we take for granted including some of the most fundamental aspects of how we understand our universe. Is the speed of light in a vacuum the same for all photons regardless of their energy? Is the rest mass of a photon actually zero? A series of recent studies explore the possibility of using transient astrophysical sources for tests!Explaining Different Arrival TimesArtists illustration of a gamma-ray burst, another extragalactic transient, in a star-forming region. [NASA/Swift/Mary Pat Hrybyk-Keith and John Jones]Suppose you observe a distant transient astrophysical source like a gamma-ray burst, or a flare from an active nucleus and two photons of different energies arrive at your telescope at different times. This difference in arrival times could be due to several different factors, depending on how deeply you want to question some of our fundamental assumptions about physics:Intrinsic delayThe photons may simply have been emitted at two different times by the astrophysical source.Delay due to Lorentz invariance violationPerhaps the assumption that all massless particles (even two photons with different energies) move at the exact same velocity in a vacuum is incorrect.Special-relativistic delayMaybe there is a universal speed for massless particles, but the assumption that photons have zero rest mass is wrong. This, too, would cause photon velocities to be energy-dependent.Delay due to gravitational potentialPerhaps our understanding of the gravitational potential that the photons experience as they travel is incorrect, also causing different flight times for photons of different energies. This would mean that Einsteins equivalence principle, a fundamental tenet of general relativity (GR), is incorrect.If we now turn this problem around, then by measuring the arrival time delay between photons of different energies from various astrophysical sources the further away, the better we can provide constraints on these

  6. Partially Hidden Markov Models

    DEFF Research Database (Denmark)

    Forchhammer, Søren Otto; Rissanen, Jorma

    1996-01-01

    Partially Hidden Markov Models (PHMM) are introduced. They differ from the ordinary HMM's in that both the transition probabilities of the hidden states and the output probabilities are conditioned on past observations. As an illustration they are applied to black and white image compression wher...

  7. Entanglement without hidden nonlocality

    Science.gov (United States)

    Hirsch, Flavien; Túlio Quintino, Marco; Bowles, Joseph; Vértesi, Tamás; Brunner, Nicolas

    2016-11-01

    We consider Bell tests in which the distant observers can perform local filtering before testing a Bell inequality. Notably, in this setup, certain entangled states admitting a local hidden variable model in the standard Bell scenario can nevertheless violate a Bell inequality after filtering, displaying so-called hidden nonlocality. Here we ask whether all entangled states can violate a Bell inequality after well-chosen local filtering. We answer this question in the negative by showing that there exist entangled states without hidden nonlocality. Specifically, we prove that some two-qubit Werner states still admit a local hidden variable model after any possible local filtering on a single copy of the state.

  8. A novel approach to equipment health management based on auto-regressive hidden semi-Markov model (AR-HSMM)

    Institute of Scientific and Technical Information of China (English)

    DONG Ming

    2008-01-01

    As a new maintenance method, CBM (condition based maintenance) is becoming more and more important for the health management of complicated and costly equipment. A prerequisite to widespread deployment of CBM technology and prac-tice in industry is effective diagnostics and prognostics. Recently, a pattern recog-nition technique called HMM (hidden Markov model) was widely used in many fields. However, due to some unrealistic assumptions, diagnositic results from HMM were not so good, and it was difficult to use HMM directly for prognosis. By relaxing the unrealistic assumptions in HMM, this paper presents a novel approach to equip-ment health management based on auto-regressive hidden semi-Markov model (AR-HSMM). Compared with HMM, AR-HSMM has three advantages: 1)It allows explicitly modeling the time duration of the hidden states and therefore is capable of prognosis. 2) It can relax observations' independence assumption by accom-modating a link between consecutive observations. 3) It does not follow the unre-alistic Markov chain's memoryless assumption and therefore provides more pow-erful modeling and analysis capability for real problems. To facilitate the computation in the proposed AR-HSMM-based diagnostics and prognostics, new forwardbackward variables are defined and a modified forward-backward algorithm is developed. The evaluation of the proposed methodology was carried out through a real world application case study: health diagnosis and prognosis of hydraulic pumps in Caterpillar Inc. The testing results show that the proposed new approach based on AR-HSMM is effective and can provide useful support for the decision-making in equipment health management.

  9. Self-similarity of complex networks and hidden metric spaces

    CERN Document Server

    Serrano, M Angeles; Boguna, Marian

    2007-01-01

    We demonstrate that the self-similarity of some scale-free networks with respect to a simple degree-thresholding renormalization scheme finds a natural interpretation in the assumption that network nodes exist in hidden metric spaces. Clustering, i.e., cycles of length three, plays a crucial role in this framework as a topological reflection of the triangle inequality in the hidden geometry. We prove that a class of hidden variable models with underlying metric spaces are able to accurately reproduce the self-similarity properties that we measured in the real networks. Our findings indicate that hidden geometries underlying these real networks are a plausible explanation for their observed topologies and, in particular, for their self-similarity with respect to the degree-based renormalization.

  10. Hidden circuits and argumentation

    Science.gov (United States)

    Leinonen, Risto; Kesonen, Mikko H. P.; Hirvonen, Pekka E.

    2016-11-01

    Despite the relevance of DC circuits in everyday life and schools, they have been shown to cause numerous learning difficulties at various school levels. In the course of this article, we present a flexible method for teaching DC circuits at lower secondary level. The method is labelled as hidden circuits, and the essential idea underlying hidden circuits is in hiding the actual wiring of DC circuits, but to make their behaviour evident for pupils. Pupils are expected to find out the wiring of the circuit which should enhance their learning of DC circuits. We present two possible ways to utilise hidden circuits in a classroom. First, they can be used to test and enhance pupils’ conceptual understanding when pupils are expected to find out which one of the offered circuit diagram options corresponds to the actual circuit shown. This method aims to get pupils to evaluate the circuits holistically rather than locally, and as a part of that aim this method highlights any learning difficulties of pupils. Second, hidden circuits can be used to enhance pupils’ argumentation skills with the aid of argumentation sheet that illustrates the main elements of an argument. Based on the findings from our co-operating teachers and our own experiences, hidden circuits offer a flexible and motivating way to supplement teaching of DC circuits.

  11. Disastrous assumptions about community disasters

    Energy Technology Data Exchange (ETDEWEB)

    Dynes, R.R. [Univ. of Delaware, Newark, DE (United States). Disaster Research Center

    1995-12-31

    Planning for local community disasters is compounded with erroneous assumptions. Six problematic models are identified: agent facts, big accident, end of the world, media, command and control, administrative. Problematic assumptions in each of them are identified. A more adequate model centered on problem solving is identified. That there is a discrepancy between disaster planning efforts and the actual response experience seems rather universal. That discrepancy is symbolized by the graffiti which predictably surfaces on many walls in post disaster locations -- ``First the earthquake, then the disaster.`` That contradiction is seldom reduced as a result of post disaster critiques, since the most usual conclusion is that the plan was adequate but the ``people`` did not follow it. Another explanation will be provided here. A more plausible explanation for failure is that most planning efforts adopt a number of erroneous assumptions which affect the outcome. Those assumptions are infrequently changed or modified by experience.

  12. Search for Hidden Particles

    CERN Multimedia

    The SHiP Experiment is a new general-purpose fixed target facility at the SPS to search for hidden particles as predicted by a very large number of recently elaborated models of Hidden Sectors which are capable of accommodating dark matter, neutrino oscillations, and the origin of the full baryon asymmetry in the Universe. Specifically, the experiment is aimed at searching for very weakly interacting long lived particles including Heavy Neutral Leptons - right-handed partners of the active neutrinos; light supersymmetric particles - sgoldstinos, etc.; scalar, axion and vector portals to the hidden sector. The high intensity of the SPS and in particular the large production of charm mesons with the 400 GeV beam allow accessing a wide variety of light long-lived exotic particles of such models and of SUSY. Moreover, the facility is ideally suited to study the interactions of tau neutrinos.

  13. Solar Hidden Photon Search

    CERN Document Server

    Schwarz, Matthias; Redondo, Javier; Ringwald, Andreas; Wiedemann, Guenter

    2011-01-01

    The Solar Hidden Photon Search (SHIPS) is a joint astroparticle project of the Hamburger Sternwarte and DESY. The main target is to detect the solar emission of a new species of particles, so called Hidden Photons (HPs). Due to kinetic mixing, photons and HPs can convert into each other as they propagate. A small number of solar HPs - originating from photon to HP oscillations in the interior of the Sun - can be converted into photons in a long vacuum pipe pointing to the Sun - the SHIPS helioscope.

  14. Solar Hidden Photon Search

    Energy Technology Data Exchange (ETDEWEB)

    Schwarz, Matthias; Wiedemann, Guenter [Hamburg Univ. (Germany). Sternwarte; Lindner, Axel; Ringwald, Andreas [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Redondo, Javier [Max-Planck-Institut fuer Physik und Astrophysik, Muenchen (Germany)

    2011-11-15

    The Solar Hidden Photon Search (SHIPS) is a joint astroparticle project of the Hamburger Sternwarte and DESY. The main target is to detect the solar emission of a new species of particles, so called Hidden Photons (HPs). Due to kinetic mixing, photons and HPs can convert into each other as they propagate. A small number of solar HPs - originating from photon to HP oscillations in the interior of the Sun - can be converted into photons in a long vacuum pipe pointing to the Sun - the SHIPS helioscope. (orig.)

  15. Legal assumptions for private company claim for additional (supplementary payment

    Directory of Open Access Journals (Sweden)

    Šogorov Stevan

    2011-01-01

    Full Text Available Subject matter of analyze in this article are legal assumptions which must be met in order to enable private company to call for additional payment. After introductory remarks discussion is focused on existence of provisions regarding additional payment in formation contract, or in shareholders meeting general resolution, as starting point for company's claim. Second assumption is concrete resolution of shareholders meeting which creates individual obligations for additional payments. Third assumption is defined as distinctness regarding sum of payment and due date. Sending of claim by relevant company body is set as fourth legal assumption for realization of company's right to claim additional payments from member of private company.

  16. Test of Poisson Failure Assumption.

    Science.gov (United States)

    1982-09-01

    o. ....... 37 00/ D itlr.: DVI r TEST OF POISSON FAILURE ASSUMPTION Chapter 1. INTRODUCTION 1.1 Background. In stockage models... precipitates a regular failure pattern; it is also possible that the coding of scheduled vs unscheduled does not reflect what we would expect. Data

  17. Sampling Assumptions in Inductive Generalization

    Science.gov (United States)

    Navarro, Daniel J.; Dry, Matthew J.; Lee, Michael D.

    2012-01-01

    Inductive generalization, where people go beyond the data provided, is a basic cognitive capability, and it underpins theoretical accounts of learning, categorization, and decision making. To complete the inductive leap needed for generalization, people must make a key "sampling" assumption about how the available data were generated.…

  18. Hidden neural networks

    DEFF Research Database (Denmark)

    Krogh, Anders Stærmose; Riis, Søren Kamaric

    1999-01-01

    A general framework for hybrids of hidden Markov models (HMMs) and neural networks (NNs) called hidden neural networks (HNNs) is described. The article begins by reviewing standard HMMs and estimation by conditional maximum likelihood, which is used by the HNN. In the HNN, the usual HMM probability...... parameters are replaced by the outputs of state-specific neural networks. As opposed to many other hybrids, the HNN is normalized globally and therefore has a valid probabilistic interpretation. All parameters in the HNN are estimated simultaneously according to the discriminative conditional maximum...... likelihood criterion. The HNN can be viewed as an undirected probabilistic independence network (a graphical model), where the neural networks provide a compact representation of the clique functions. An evaluation of the HNN on the task of recognizing broad phoneme classes in the TIMIT database shows clear...

  19. Coupling of Hidden Sector

    CERN Document Server

    Królikowski, Wojciech

    2016-01-01

    A hypothetic Hidden Sector of the Universe, consisting of sterile fermions ("sterinos") and sterile mediating bosons ("sterons") of mass dimension 1 (not 2!) - the last described by an antisymmetric tensor field - requires to exist also a scalar isovector and scalar isoscalar in order to be able to construct electroweak invariant coupling (before spontaneously breaking its symmetry). The introduced scalar isoscalar might be a resonant source for the diphoton excess of 750 GeV, suggested recently by experiment.

  20. Hidden variables and hidden time in quantum theory

    OpenAIRE

    Kurakin, Pavel V.

    2005-01-01

    Bell's theorem proves only that hidden variables evolving in true physical time can't exist; still the theorem's meaning is usually interpreted intolerably wide. The concept of hidden time (and, in general, hidden space-time) is introduced. Such concept provides a whole new class of physical theories, fully compatible with current knowledge, but giving new tremendous possibilities. Those theories do not violate Bell's theorem.

  1. Modern Cosmology: Assumptions and Limits

    Science.gov (United States)

    Hwang, Jai-Chan

    2012-06-01

    Physical cosmology tries to understand the Universe at large with its origin and evolution. Observational and experimental situations in cosmology do not allow us to proceed purely based on the empirical means. We examine in which sense our cosmological assumptions in fact have shaped our current cosmological worldview with consequent inevitable limits. Cosmology, as other branches of science and knowledge, is a construct of human imagination reflecting the popular belief system of the era. The question at issue deserves further philosophic discussions. In Whitehead's words, ``philosophy, in one of its functions, is the critic of cosmologies.'' (Whitehead 1925).

  2. Modern Cosmology: Assumptions and Limits

    CERN Document Server

    Hwang, Jai-chan

    2012-01-01

    Physical cosmology tries to understand the Universe at large with its origin and evolution. Observational and experimental situations in cosmology do not allow us to proceed purely based on the empirical means. We examine in which sense our cosmological assumptions in fact have shaped our current cosmological worldview with consequent inevitable limits. Cosmology, as other branches of science and knowledge, is a construct of human imagination reflecting the popular belief system of the era. The question at issue deserves further philosophic discussions. In Whitehead's words, "philosophy, in one of its functions, is the critic of cosmologies". (Whitehead 1925)

  3. Binary hidden Markov models and varieties

    CERN Document Server

    Critch, Andrew J

    2012-01-01

    The technological applications of hidden Markov models have been extremely diverse and successful, including natural language processing, gesture recognition, gene sequencing, and Kalman filtering of physical measurements. HMMs are highly non-linear statistical models, and just as linear models are amenable to linear algebraic techniques, non-linear models are amenable to commutative algebra and algebraic geometry. This paper examines closely those HMMs in which all the random variables, called nodes, are binary. Its main contributions are (1) minimal defining equations for the 4-node model, comprising 21 quadrics and 29 cubics, which were computed using Gr\\"obner bases in the cumulant coordinates of Sturmfels and Zwiernik, and (2) a birational parametrization for every binary HMM, with an explicit inverse for recovering the hidden parameters in terms of observables. The new model parameters in (2) are hence rationally identifiable in the sense of Sullivant, Garcia-Puente, and Spielvogel, and each model's Zar...

  4. Attribute-Based Encryption with Partially Hidden Ciphertext Policies

    Science.gov (United States)

    Nishide, Takashi; Yoneyama, Kazuki; Ohta, Kazuo

    We propose attribute-based encryption schemes where encryptor-specified policies (called ciphertext policies) are hidden. By using our schemes, an encryptor can encrypt data with a hidden access control policy. A decryptor obtains her secret key associated with her attributes from a trusted authority in advance and if the attributes associated with the decryptor's secret key do not satisfy the access control policy associated with the encrypted data, the decryptor cannot decrypt the data or guess even what access control policy was specified by the encryptor. We prove security of our construction based on the Decisional Bilinear Diffie-Hellman assumption and the Decision Linear assumption. In our security notion, even the legitimate decryptor cannot obtain the information about the access control policy associated with the encrypted data more than the fact that she can decrypt the data.

  5. Challenged assumptions and invisible effects

    DEFF Research Database (Denmark)

    Wimmelmann, Camilla Lawaetz; Vitus, Kathrine; Jervelund, Signe Smith

    2017-01-01

    for the implementation—different from the assumed conditions—not only challenge the implementation of the intervention but also potentially produce unanticipated yet valuable effects. Research implications – Newly arrived immigrants represent a hugely diverse and heterogeneous group of people with differing values...... of two complete intervention courses and an analysis of the official intervention documents. Findings – This case study exemplifies how the basic normative assumptions behind an immigrant-oriented intervention and the intrinsic power relations therein may be challenged and negotiated by the participants....... In particular, the assumed (power) relations inherent in immigrant-oriented educational health interventions, in which immigrants are in a novice position, are challenged, as the immigrants are experienced adults (and parents) in regard to healthcare. The paper proposes that such unexpected conditions...

  6. Faulty assumptions for repository requirements

    Energy Technology Data Exchange (ETDEWEB)

    Sutcliffe, W G

    1999-06-03

    Long term performance requirements for a geologic repository for spent nuclear fuel and high-level waste are based on assumptions concerning water use and subsequent deaths from cancer due to ingesting water contaminated with radio isotopes ten thousand years in the future. This paper argues that the assumptions underlying these requirements are faulty for a number of reasons. First, in light of the inevitable technological progress, including efficient desalination of water, over the next ten thousand years, it is inconceivable that a future society would drill for water near a repository. Second, even today we would not use water without testing its purity. Third, today many types of cancer are curable, and with the rapid progress in medical technology in general, and the prevention and treatment of cancer in particular, it is improbable that cancer caused by ingesting contaminated water will be a sign&ant killer in the far future. This paper reviews the performance requirements for geological repositories and comments on the difficulties in proving compliance in the face of inherent uncertainties. The already tiny long-term risk posed by a geologic repository is presented and contrasted with contemporary every day risks. A number of examples of technological progress, including cancer treatments, are advanced. The real and significant costs resulting from the overly conservative requirements are then assessed. Examples are given of how money (and political capital) could be put to much better use to save lives today and in the future. It is concluded that although a repository represents essentially no long-term risk, monitored retrievable dry storage (above or below ground) is the current best alternative for spent fuel and high-level nuclear waste.

  7. To the point: reviews in medical education-taking control of the hidden curriculum.

    Science.gov (United States)

    Chuang, Alice W; Nuthalapaty, Francis S; Casey, Petra M; Kaczmarczyk, Joseph M; Cullimore, Amie J; Dalrymple, John L; Dugoff, Lorraine; Espey, Eve L; Hammoud, Maya M; Hueppchen, Nancy A; Katz, Nadine T; Peskin, Edward G

    2010-10-01

    This article, the ninth in the "To the Point" series that is prepared by the Association of Professors of Gynecology and Obstetrics Undergraduate Medical Education Committee, discusses the role of the "hidden curriculum" in shaping the professional identity of doctors in training. The characteristics that distinguish the formal curriculum and hidden curriculum are defined. Specific examples of hidden curricula in clinical environments and the positive and negative impacts that may result are highlighted. Techniques to evaluate clinical training environments and to identify the hidden curriculum are provided and are followed by methods to promote its positive messages and lessen its negative ones.

  8. On testing the missing at random assumption

    DEFF Research Database (Denmark)

    Jaeger, Manfred

    2006-01-01

    Most approaches to learning from incomplete data are based on the assumption that unobserved values are missing at random (mar). While the mar assumption, as such, is not testable, it can become testable in the context of other distributional assumptions, e.g. the naive Bayes assumption. In this ......Most approaches to learning from incomplete data are based on the assumption that unobserved values are missing at random (mar). While the mar assumption, as such, is not testable, it can become testable in the context of other distributional assumptions, e.g. the naive Bayes assumption....... In this paper we investigate a method for testing the mar assumption in the presence of other distributional constraints. We present methods to (approximately) compute a test statistic consisting of the ratio of two profile likelihood functions. This requires the optimization of the likelihood under...

  9. Uncovering Metaethical Assumptions in Bioethical Discourse across Cultures.

    Science.gov (United States)

    Sullivan, Laura Specker

    2016-03-01

    Much of bioethical discourse now takes place across cultures. This does not mean that cross-cultural understanding has increased. Many cross-cultural bioethical discussions are marked by entrenched disagreement about whether and why local practices are justified. In this paper, I argue that a major reason for these entrenched disagreements is that problematic metaethical commitments are hidden in these cross-cultural discourses. Using the issue of informed consent in East Asia as an example of one such discourse, I analyze two representative positions in the discussion and identify their metaethical commitments. I suggest that the metaethical assumptions of these positions result from their shared method of ethical justification: moral principlism. I then show why moral principlism is problematic in cross-cultural analyses and propose a more useful method for pursuing ethical justification across cultures.

  10. Hidden attractors in dynamical systems

    Science.gov (United States)

    Dudkowski, Dawid; Jafari, Sajad; Kapitaniak, Tomasz; Kuznetsov, Nikolay V.; Leonov, Gennady A.; Prasad, Awadhesh

    2016-06-01

    Complex dynamical systems, ranging from the climate, ecosystems to financial markets and engineering applications typically have many coexisting attractors. This property of the system is called multistability. The final state, i.e., the attractor on which the multistable system evolves strongly depends on the initial conditions. Additionally, such systems are very sensitive towards noise and system parameters so a sudden shift to a contrasting regime may occur. To understand the dynamics of these systems one has to identify all possible attractors and their basins of attraction. Recently, it has been shown that multistability is connected with the occurrence of unpredictable attractors which have been called hidden attractors. The basins of attraction of the hidden attractors do not touch unstable fixed points (if exists) and are located far away from such points. Numerical localization of the hidden attractors is not straightforward since there are no transient processes leading to them from the neighborhoods of unstable fixed points and one has to use the special analytical-numerical procedures. From the viewpoint of applications, the identification of hidden attractors is the major issue. The knowledge about the emergence and properties of hidden attractors can increase the likelihood that the system will remain on the most desirable attractor and reduce the risk of the sudden jump to undesired behavior. We review the most representative examples of hidden attractors, discuss their theoretical properties and experimental observations. We also describe numerical methods which allow identification of the hidden attractors.

  11. Detecting Structural Breaks using Hidden Markov Models

    DEFF Research Database (Denmark)

    Ntantamis, Christos

    Testing for structural breaks and identifying their location is essential for econometric modeling. In this paper, a Hidden Markov Model (HMM) approach is used in order to perform these tasks. Breaks are defined as the data points where the underlying Markov Chain switches from one state to another....... The locations of the breaks are subsequently obtained by assigning states to data points according to the Maximum Posterior Mode (MPM) algorithm. The Integrated Classification Likelihood-Bayesian Information Criterion (ICL-BIC) allows for the determination of the number of regimes by taking into account...... in the monetary policy of United States, the dierent functional form being variants of the Taylor (1993) rule....

  12. Managing Hidden Costs of Offshoring

    DEFF Research Database (Denmark)

    Larsen, Marcus M.; Pedersen, Torben

    2014-01-01

    This chapter investigates the concept of the ‘hidden costs’ of offshoring, i.e. unexpected offshoring costs exceeding the initially expected costs. Due to the highly undefined nature of these costs, we position our analysis towards the strategic responses of firms’ realisation of hidden costs....... In this regard, we argue that a major response to the hidden costs of offshoring is the identification and utilisation of strategic mechanisms in the organisational design to eventually achieving system integration in a globally dispersed and disaggregated organisation. This is heavily moderated by a learning...

  13. Variational Infinite Hidden Conditional Random Fields

    NARCIS (Netherlands)

    Bousmalis, Konstantinos; Zafeiriou, Stefanos; Morency, Louis-Philippe; Pantic, Maja; Ghahramani, Zoubin

    2015-01-01

    Hidden conditional random fields (HCRFs) are discriminative latent variable models which have been shown to successfully learn the hidden structure of a given classification problem. An Infinite hidden conditional random field is a hidden conditional random field with a countably infinite number of

  14. How Symmetrical Assumptions Advance Strategic Management Research

    DEFF Research Database (Denmark)

    Foss, Nicolai Juul; Hallberg, Hallberg

    2014-01-01

    We develop the case for symmetrical assumptions in strategic management theory. Assumptional symmetry obtains when assumptions made about certain actors and their interactions in one of the application domains of a theory are also made about this set of actors and their interactions in other appl...

  15. Detect and exploit hidden structure in fatty acid signature data

    Science.gov (United States)

    Budge, Suzanne; Bromaghin, Jeffrey; Thiemann, Gregory

    2017-01-01

    Estimates of predator diet composition are essential to our understanding of their ecology. Although several methods of estimating diet are practiced, methods based on biomarkers have become increasingly common. Quantitative fatty acid signature analysis (QFASA) is a popular method that continues to be refined and extended. Quantitative fatty acid signature analysis is based on differences in the signatures of prey types, often species, which are recognized and designated by investigators. Similarly, predator signatures may be structured by known factors such as sex or age class, and the season or region of sample collection. The recognized structure in signature data inherently influences QFASA results in important and typically beneficial ways. However, predator and prey signatures may contain additional, hidden structure that investigators either choose not to incorporate into an analysis or of which they are unaware, being caused by unknown ecological mechanisms. Hidden structure also influences QFASA results, most often negatively. We developed a new method to explore signature data for hidden structure, called divisive magnetic clustering (DIMAC). Our DIMAC approach is based on the same distance measure used in diet estimation, closely linking methods of data exploration and parameter estimation, and it does not require data transformation or distributional assumptions, as do many multivariate ordination methods in common use. We investigated the potential benefits of the DIMAC method to detect and subsequently exploit hidden structure in signature data using two prey signature libraries with quite different characteristics. We found that the existence of hidden structure in prey signatures can increase the confusion between prey types and thereby reduce the accuracy and precision of QFASA diet estimates. Conversely, the detection and exploitation of hidden structure represent a potential opportunity to improve predator diet estimates and may lead to new

  16. Hidden Statistics of Schroedinger Equation

    Science.gov (United States)

    Zak, Michail

    2011-01-01

    Work was carried out in determination of the mathematical origin of randomness in quantum mechanics and creating a hidden statistics of Schr dinger equation; i.e., to expose the transitional stochastic process as a "bridge" to the quantum world. The governing equations of hidden statistics would preserve such properties of quantum physics as superposition, entanglement, and direct-product decomposability while allowing one to measure its state variables using classical methods.

  17. Microgenetic analysis of hidden figures

    OpenAIRE

    Marković Slobodan S.; Gvozdenović Vasilije P.

    2006-01-01

    In this study the phenomenological and processual aspects of the perception of hidden figures were compared. The question was whether the more probable percepts of hidden figures, compared to the less probable percepts, were generated in earlier stages of the perceptual process. In the pilot study the subjects were asked to say what they see in a complex linear pattern. The three most frequent and the three least frequent perceptual descriptions were selected. In the experiment the microgenes...

  18. The Hidden Subgroup Problem

    CERN Document Server

    Wang, Frédéric

    2010-01-01

    We give an overview of the Hidden Subgroup Problem (HSP) as of July 2010, including new results discovered since the survey of arXiv:quant-ph/0411037v1. We recall how the problem provides a framework for efficient quantum algorithms and present the standard methods based on coset sampling. We study the Dihedral and Symmetric HSPs and how they relate to hard problems on lattices and graphs. Finally, we conclude with the known solutions and techniques, describe connections with efficient algorithms as well as miscellaneous variants of HSP. We also bring various contributions to the topic. We show that in theory, we can solve HSP over a given group inductively: the base case is solving HSP over its simple factor groups and the inductive step is building efficient oracles over a normal subgroup N and over the factor group G/N. We apply this analysis to the Dedekindian HSP to get an alternative abelian HSP algorithm based on a change of the underlying group. We also propose a quotient reduction by the normal group...

  19. Managing Hidden Costs of Offshoring

    DEFF Research Database (Denmark)

    Larsen, Marcus M.; Pedersen, Torben

    2014-01-01

    This chapter investigates the concept of the ‘hidden costs’ of offshoring, i.e. unexpected offshoring costs exceeding the initially expected costs. Due to the highly undefined nature of these costs, we position our analysis towards the strategic responses of firms’ realisation of hidden costs. In......-by-doing process, where hidden costs motivate firms and their employees to search for new and better knowledge on how to successfully manage the organisation. We illustrate this thesis based on the case of the LEGO Group.......This chapter investigates the concept of the ‘hidden costs’ of offshoring, i.e. unexpected offshoring costs exceeding the initially expected costs. Due to the highly undefined nature of these costs, we position our analysis towards the strategic responses of firms’ realisation of hidden costs....... In this regard, we argue that a major response to the hidden costs of offshoring is the identification and utilisation of strategic mechanisms in the organisational design to eventually achieving system integration in a globally dispersed and disaggregated organisation. This is heavily moderated by a learning...

  20. The Hidden Costs of Offshoring

    DEFF Research Database (Denmark)

    Møller Larsen, Marcus; Manning, Stephan; Pedersen, Torben

    2011-01-01

    This study seeks to explain hidden costs of offshoring, i.e. unexpected costs resulting from the relocation of business tasks and activities outside the home country. We develop a model that highlights the role of complexity, design orientation and experience in explaining hidden costs of offshor...... of our study is to suggest how hidden costs of offshoring can be mitigated through an explicit orientation towards improving organizational processes and structures as well as experience with offshoring.......This study seeks to explain hidden costs of offshoring, i.e. unexpected costs resulting from the relocation of business tasks and activities outside the home country. We develop a model that highlights the role of complexity, design orientation and experience in explaining hidden costs...... of offshoring. Specifically, we propose that hidden costs can be explained by the combination of increasing structural, operational and social complexity of offshoring activities. In addition, we suggest that firm orientation towards organizational design as part of an offshoring strategy and offshoring...

  1. Ontology-based Knowledge Extraction from Hidden Web

    Institute of Scientific and Technical Information of China (English)

    SONG Hui; MA Fan-yuan; LIU Xiao-qiang

    2004-01-01

    Hidden Web provides great amount of domain-specific data for constructing knowledge services. Most previous knowledge extraction researches ignore the valuable data hidden in Web database, and related works do not refer how to make extracted information available for knowledge system. This paper describes a novel approach to build a domain-specific knowledge service with the data retrieved from Hidden Web. Ontology serves to model the domain knowledge. Queries forms of different Web sites are translated into machine-understandable format, defined knowledge concepts, so that they can be accessed automatically. Also knowledge data are extracted from Web pages and organized in ontology format knowledge. The experiment proves the algorithm achieves high accuracy and the system facilitates constructing knowledge services greatly.

  2. The Detection of Hidden Periodicities in EEG

    Institute of Scientific and Technical Information of China (English)

    YOU Rong-yi

    2007-01-01

    Abstract.A novel method for detecting the hidden periodicities in EEG is proposed.By using a width-varying window in the time domain, the structure function of EEG time series is defined. It is found that the minima of the structure function, within a finite window width, can be found regularly, which indicate that there are some certain periodicities associated with EEG time series. Based on the structure function, a further quadratic structure function of EEG time series is defined. By quadratic structure function, it can be seen that the periodicities of EEG become more obvious, moreover, the period of EEG can be determined accurately. These results will be meaningful for studying the neuron activity inside the human brain.

  3. On testing the missing at random assumption

    DEFF Research Database (Denmark)

    Jaeger, Manfred

    2006-01-01

    Most approaches to learning from incomplete data are based on the assumption that unobserved values are missing at random (mar). While the mar assumption, as such, is not testable, it can become testable in the context of other distributional assumptions, e.g. the naive Bayes assumption....... In this paper we investigate a method for testing the mar assumption in the presence of other distributional constraints. We present methods to (approximately) compute a test statistic consisting of the ratio of two profile likelihood functions. This requires the optimization of the likelihood under...... no assumptionson the missingness mechanism, for which we use our recently proposed AI \\& M algorithm. We present experimental results on synthetic data that show that our approximate test statistic is a good indicator for whether data is mar relative to the given distributional assumptions....

  4. Evolution of Requirements and Assumptions for Future Exploration Missions

    Science.gov (United States)

    Anderson, Molly; Sargusingh, Miriam; Perry, Jay

    2017-01-01

    NASA programs are maturing technologies, systems, and architectures to enabling future exploration missions. To increase fidelity as technologies mature, developers must make assumptions that represent the requirements of a future program. Multiple efforts have begun to define these requirements, including team internal assumptions, planning system integration for early demonstrations, and discussions between international partners planning future collaborations. For many detailed life support system requirements, existing NASA documents set limits of acceptable values, but a future vehicle may be constrained in other ways, and select a limited range of conditions. Other requirements are effectively set by interfaces or operations, and may be different for the same technology depending on whether the hard-ware is a demonstration system on the International Space Station, or a critical component of a future vehicle. This paper highlights key assumptions representing potential life support requirements and explanations of the driving scenarios, constraints, or other issues that drive them.

  5. Stargate of the Hidden Multiverse

    Directory of Open Access Journals (Sweden)

    Alexander Antonov

    2016-02-01

    Full Text Available Concept of Monoverse, which corresponds to the existing broad interpretation of the second postulate of the special theory of relativity, is not consistent with the modern astrophysical reality — existence of the dark matter and the dark energy, the total mass-energy of which is ten times greater than the mass-energy of the visible universe (which has been considered as the entire universe until very recent . This concept does not allow to explain their rather unusual properties — invisibility and lack of baryon content — which would seem to even destroy the very modern understanding of the term ‘matter’. However, all numerous alternative concepts of Multiverses, which have been proposed until today, are unable to explain these properties of the dark matter and dark energy. This article describes a new concept: the concept of the hidden Multiverse and hidden Supermultiverse, which mutual invisibility of parallel universes is explained by the physical reality of imaginary numbers. This concept completely explains the phenomenon of the dark matter and the dark energy. Moreover, it is shown that the dark matter and the dark energy are the experimental evidence for the existence of the hidden Multiverse. Described structure of the hidden Multiverse is fully consistent with the data obtained by the space stations WMAP and Planck. An extremely important property of the hidden Multiverse is an actual possibility of its permeation through stargate located on the Earth.

  6. Hidden photons in connection to dark matter

    Energy Technology Data Exchange (ETDEWEB)

    Andreas, Sarah; Ringwald, Andreas [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Goodsell, Mark D. [CPhT, Ecole Polytechnique, Palaiseau (France)

    2013-06-15

    Light extra U(1) gauge bosons, so called hidden photons, which reside in a hidden sector have attracted much attention since they are a well motivated feature of many scenarios beyond the Standard Model and furthermore could mediate the interaction with hidden sector dark matter.We review limits on hidden photons from past electron beam dump experiments including two new limits from such experiments at KEK and Orsay. In addition, we study the possibility of having dark matter in the hidden sector. A simple toy model and different supersymmetric realisations are shown to provide viable dark matter candidates in the hidden sector that are in agreement with recent direct detection limits.

  7. Hidden worlds in quantum physics

    CERN Document Server

    Gouesbet, Gérard

    2014-01-01

    The past decade has witnessed a resurgence in research and interest in the areas of quantum computation and entanglement. This new book addresses the hidden worlds or variables of quantum physics. Author Gérard Gouesbet studied and worked with a former student of Louis de Broglie, a pioneer of quantum physics. His presentation emphasizes the history and philosophical foundations of physics, areas that will interest lay readers as well as professionals and advanced undergraduate and graduate students of quantum physics. The introduction is succeeded by chapters offering background on relevant concepts in classical and quantum mechanics, a brief history of causal theories, and examinations of the double solution, pilot wave, and other hidden-variables theories. Additional topics include proofs of possibility and impossibility, contextuality, non-locality, classification of hidden-variables theories, and stochastic quantum mechanics. The final section discusses how to gain a genuine understanding of quantum mec...

  8. The Hidden Costs of Offshoring

    DEFF Research Database (Denmark)

    Møller Larsen, Marcus; Manning, Stephan; Pedersen, Torben

    2011-01-01

    experience moderate the relationship between complexity and hidden costs negatively i.e. reduces the cost generating impact of complexity. We develop three hypotheses and test them on comprehensive data from the Offshoring Research Network (ORN). In general, we find support for our hypotheses. A key result...... of offshoring. Specifically, we propose that hidden costs can be explained by the combination of increasing structural, operational and social complexity of offshoring activities. In addition, we suggest that firm orientation towards organizational design as part of an offshoring strategy and offshoring...

  9. Define Project

    DEFF Research Database (Denmark)

    Munk-Madsen, Andreas

    2005-01-01

    "Project" is a key concept in IS management. The word is frequently used in textbooks and standards. Yet we seldom find a precise definition of the concept. This paper discusses how to define the concept of a project. The proposed definition covers both heavily formalized projects and informally...... organized, agile projects. Based on the proposed definition popular existing definitions are discussed....

  10. The Self in Guidance: Assumptions and Challenges.

    Science.gov (United States)

    Edwards, Richard; Payne, John

    1997-01-01

    Examines the assumptions of "self" made in the professional and managerial discourses of guidance. Suggests that these assumptions obstruct the capacity of guidance workers to explain their own practices. Drawing on contemporary debates over identity, modernity, and postmodernity, argues for a more explicit debate about the self in guidance. (RJM)

  11. Assumptions of Multiple Regression: Correcting Two Misconceptions

    Directory of Open Access Journals (Sweden)

    Matt N. Williams

    2013-09-01

    Full Text Available In 2002, an article entitled - Four assumptions of multiple regression that researchers should always test- by.Osborne and Waters was published in PARE. This article has gone on to be viewed more than 275,000 times.(as of August 2013, and it is one of the first results displayed in a Google search for - regression.assumptions- . While Osborne and Waters' efforts in raising awareness of the need to check assumptions.when using regression are laudable, we note that the original article contained at least two fairly important.misconceptions about the assumptions of multiple regression: Firstly, that multiple regression requires the.assumption of normally distributed variables; and secondly, that measurement errors necessarily cause.underestimation of simple regression coefficients. In this article, we clarify that multiple regression models.estimated using ordinary least squares require the assumption of normally distributed errors in order for.trustworthy inferences, at least in small samples, but not the assumption of normally distributed response or.predictor variables. Secondly, we point out that regression coefficients in simple regression models will be.biased (toward zero estimates of the relationships between variables of interest when measurement error is.uncorrelated across those variables, but that when correlated measurement error is present, regression.coefficients may be either upwardly or downwardly biased. We conclude with a brief corrected summary of.the assumptions of multiple regression when using ordinary least squares.

  12. Wrong assumptions in the financial crisis

    NARCIS (Netherlands)

    Aalbers, M.B.

    2009-01-01

    Purpose - The purpose of this paper is to show how some of the assumptions about the current financial crisis are wrong because they misunderstand what takes place in the mortgage market. Design/methodology/approach - The paper discusses four wrong assumptions: one related to regulation, one to leve

  13. Hidden Crises and Communication : An Interactional Analysis of Hidden Crises

    NARCIS (Netherlands)

    Klarenbeek, Annette

    2011-01-01

    In this paper I describe the ways in which the communication discipline can make a hidden crisis transparent. For this purpose I examine the concept of crisis entrepreneurship from a communication point of view. Using discourse analysis, I analyse the discursive practices of crisis entrepreneurs in

  14. Raising awareness of the hidden curriculum in veterinary medical education: a review and call for research.

    Science.gov (United States)

    Whitcomb, Tiffany L

    2014-01-01

    The hidden curriculum is characterized by information that is tacitly conveyed to and among students about the cultural and moral environment in which they find themselves. Although the hidden curriculum is often defined as a distinct entity, tacit information is conveyed to students throughout all aspects of formal and informal curricula. This unconsciously communicated knowledge has been identified across a wide spectrum of educational environments and is known to have lasting and powerful impacts, both positive and negative. Recently, medical education research on the hidden curriculum of becoming a doctor has come to the forefront as institutions struggle with inconsistencies between formal and hidden curricula that hinder the practice of patient-centered medicine. Similarly, the complex ethical questions that arise during the practice and teaching of veterinary medicine have the potential to cause disagreement between what the institution sets out to teach and what is actually learned. However, the hidden curriculum remains largely unexplored for this field. Because the hidden curriculum is retained effectively by students, elucidating its underlying messages can be a key component of program refinement. A review of recent literature about the hidden curriculum in a variety of fields, including medical education, will be used to explore potential hidden curricula in veterinary medicine and draw attention to the need for further investigation.

  15. Modeling Multiple Risks: Hidden Domain of Attraction

    CERN Document Server

    Mitra, Abhimanyu

    2011-01-01

    Hidden regular variation is a sub-model of multivariate regular variation and facilitates accurate estimation of joint tail probabilities. We generalize the model of hidden regular variation to what we call hidden domain of attraction. We exhibit examples that illustrate the need for a more general model and discuss detection and estimation techniques.

  16. Pentaquark states with hidden charm

    Science.gov (United States)

    Bijker, Roelof

    2017-07-01

    I develop an extension of the usual three-flavor quark model to four flavors (u, d, s and c), and discuss the classification of pentaquark states with hidden charm. This work is motivated by the recent observation of such states by the LHCb Collatoration at CERN.

  17. Microgenetic analysis of hidden figures

    Directory of Open Access Journals (Sweden)

    Marković Slobodan S.

    2006-01-01

    Full Text Available In this study the phenomenological and processual aspects of the perception of hidden figures were compared. The question was whether the more probable percepts of hidden figures, compared to the less probable percepts, were generated in earlier stages of the perceptual process. In the pilot study the subjects were asked to say what they see in a complex linear pattern. The three most frequent and the three least frequent perceptual descriptions were selected. In the experiment the microgenesis of the perception of hidden figures was investigated. The primed matching paradigm and the same-different task were used. In each experiment two types of test figures were contrasted: the more frequent and the less frequent ones. There were two prime types: identical (equal to test figures and complex (the pattern with hidden test figures. The prime duration was varied, 50 ms and 400 ms. The main result indicates that in the case of complex priming the more frequent test figures were processed significantly faster than the less frequent ones in both prime duration conditions. These results suggest that the faster the processing of a figure, the more probable the perceptual generation of this figure.

  18. New Cryptosystem Using Multiple Cryptographic Assumptions

    Directory of Open Access Journals (Sweden)

    E. S. Ismail

    2011-01-01

    Full Text Available Problem statement: A cryptosystem is a way for a sender and a receiver to communicate digitally by which the sender can send receiver any confidential or private message by first encrypting it using the receiver’s public key. Upon receiving the encrypted message, the receiver can confirm the originality of the message’s contents using his own secret key. Up to now, most of the existing cryptosystems were developed based on a single cryptographic assumption like factoring, discrete logarithms, quadratic residue or elliptic curve discrete logarithm. Although these schemes remain secure today, one day in a near future they may be broken if one finds a polynomial algorithm that can efficiently solve the underlying cryptographic assumption. Approach: By this motivation, we designed a new cryptosystem based on two cryptographic assumptions; quadratic residue and discrete logarithms. We integrated these two assumptions in our encrypting and decrypting equations so that the former depends on one public key whereas the latter depends on one corresponding secret key and two secret numbers. Each of public and secret keys in our scheme determines the assumptions we use. Results: The newly developed cryptosystem is shown secure against the three common considering algebraic attacks using a heuristic security technique. The efficiency performance of our scheme requires 2Texp+2Tmul +Thash time complexity for encryption and Texp+2Tmul+Tsrt time complexity for decryption and this magnitude of complexity is considered minimal for multiple cryptographic assumptions-like cryptosystems. Conclusion: The new cryptosystem based on multiple cryptographic assumptions offers a greater security level than that schemes based on a single cryptographic assumption. The adversary has to solve the two assumptions simultaneously to recover the original message from the received corresponding encrypted message but this is very unlikely to happen.

  19. Probabilistic Resilience in Hidden Markov Models

    Science.gov (United States)

    Panerati, Jacopo; Beltrame, Giovanni; Schwind, Nicolas; Zeltner, Stefan; Inoue, Katsumi

    2016-05-01

    Originally defined in the context of ecological systems and environmental sciences, resilience has grown to be a property of major interest for the design and analysis of many other complex systems: resilient networks and robotics systems other the desirable capability of absorbing disruption and transforming in response to external shocks, while still providing the services they were designed for. Starting from an existing formalization of resilience for constraint-based systems, we develop a probabilistic framework based on hidden Markov models. In doing so, we introduce two new important features: stochastic evolution and partial observability. Using our framework, we formalize a methodology for the evaluation of probabilities associated with generic properties, we describe an efficient algorithm for the computation of its essential inference step, and show that its complexity is comparable to other state-of-the-art inference algorithms.

  20. Optical tests of Bell's inequalities not resting upon the absurd fair sampling assumption

    CERN Document Server

    Santos, E

    2004-01-01

    A simple local hidden-variables model is exhibited which reproduces the results of all performed tests of Bell\\'{}s inequalities involving optical photon pairs. For the old atomic-cascade experiments, like Aspect\\'{}s, the model agrees with quantum mechanics even for ideal set-ups. For more recent experiments, using parametric down-converted photons, the agreement occurs only for actual experiments, involving low efficiency detectors. Arguments are given against the fair sampling assumption, currently combined with the results of the experiments in order to claim a contradiction with local realism. New tests are proposed which are able to discriminate between quantum mechanics and a restricted, but appealing, family of local hidden-variables models. Such tests require detectors with efficiencies just above 20%.

  1. Algorithms for Hidden Markov Models Restricted to Occurrences of Regular Expressions

    DEFF Research Database (Denmark)

    Tataru, Paula; Sand, Andreas; Hobolth, Asger;

    2013-01-01

    Hidden Markov Models (HMMs) are widely used probabilistic models, particularly for annotating sequential data with an underlying hidden structure. Patterns in the annotation are often more relevant to study than the hidden structure itself. A typical HMM analysis consists of annotating the observed...... data using a decoding algorithm and analyzing the annotation to study patterns of interest. For example, given an HMM modeling genes in DNA sequences, the focus is on occurrences of genes in the annotation. In this paper, we define a pattern through a regular expression and present a restriction...

  2. A Cmparison of Closed World Assumptions

    Institute of Scientific and Technical Information of China (English)

    沈一栋

    1992-01-01

    In this Paper.we introduce a notion of the family of closed world assumptions and compare several well-known closed world approaches in the family to the extent to whic an incomplete database is com pleted.

  3. Examining Computational Assumptions For Godiva IV

    Energy Technology Data Exchange (ETDEWEB)

    Kirkland, Alexander Matthew [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Jaegers, Peter James [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2016-08-11

    Over the course of summer 2016, the effects of several computational modeling assumptions with respect to the Godiva IV reactor were examined. The majority of these assumptions pertained to modeling errors existing in the control rods and burst rod. The Monte Carlo neutron transport code, MCNP, was used to investigate these modeling changes, primarily by comparing them to that of the original input deck specifications.

  4. Consistent histories, quantum truth functionals, and hidden variables

    Science.gov (United States)

    Griffiths, Robert B.

    2000-01-01

    A central principle of consistent histories quantum theory, the requirement that quantum descriptions be based upon a single framework (or family), is employed to show that there is no conflict between consistent histories and a no-hidden-variables theorem of Bell, and Kochen and Specker, contrary to a recent claim by Bassi and Ghirardi. The argument makes use of `truth functionals' defined on a Boolean algebra of classical or quantum properties.

  5. Consistent histories, quantum truth functionals, and hidden variables

    CERN Document Server

    Griffiths, R B

    1999-01-01

    A central principle of consistent histories quantum theory, the requirement that quantum descriptions be based upon a single framework (or family), is employed to show that there is no conflict between consistent histories and a no-hidden-variables theorem of Bell, and Kochen and Specker, contrary to a recent claim by Bassi and Ghirardi. The argument makes use of ``truth functionals'' defined on a Boolean algebra of classical or quantum properties.

  6. A Hidden Twelve-Dimensional SuperPoincare Symmetry In Eleven Dimensions

    Energy Technology Data Exchange (ETDEWEB)

    Bars, Itzhak; Deliduman, Cemsinan; Pasqua, Andrea; Zumino, Bruno

    2003-12-13

    First, we review a result in our previous paper, of how a ten-dimensional superparticle, taken off-shell, has a hidden eleven-dimensional superPoincare symmetry. Then, we show that the physical sector is defined by three first-class constraints which preserve the full eleven-dimensional symmetry. Applying the same concepts to the eleven dimensional superparticle, taken off-shell, we discover a hidden twelve dimensional superPoincare symmetry that governs the theory.

  7. Hidden twelve-dimensional super Poincaré symmetry in eleven dimensions

    CERN Document Server

    Bars, Itzhak; Pasqua, A; Zumino, B; Bars, Itzhak; Deliduman, Cemsinan; Pasqua, Andrea; Zumino, Bruno

    2004-01-01

    First, we review a result in our previous paper, of how a ten-dimensional superparticle, taken off-shell, has a hidden eleven-dimensional superPoincare symmetry. Then, we show that the physical sector is defined by three first-class constraints which preserve the full eleven-dimensional symmetry. Applying the same concepts to the eleven dimensional superparticle, taken off-shell, we discover a hidden twelve dimensional superPoincare symmetry that governs the theory.

  8. Nonintentional behavioural responses to psi : hidden targets and hidden observers

    OpenAIRE

    Anderson, Mary-Jane Charlotte

    2012-01-01

    Psi is the phenomenon of apparently responding to or receiving information by means other than the recognised senses. Psi information may influence human behaviour, without the individual intending this or even being aware of it. This thesis seeks to investigate nonintentional behavioural responses to psi. We present five empirical studies that investigated nonintentional behavioural responses to psi information. In each study, the psi information was hidden from participants, ...

  9. Reduced-Rank Hidden Markov Models

    CERN Document Server

    Siddiqi, Sajid M; Gordon, Geoffrey J

    2009-01-01

    We introduce the Reduced-Rank Hidden Markov Model (RR-HMM), a generalization of HMMs that can model smooth state evolution as in Linear Dynamical Systems (LDSs) as well as non-log-concave predictive distributions as in continuous-observation HMMs. RR-HMMs assume an m-dimensional latent state and n discrete observations, with a transition matrix of rank k <= m. This implies the dynamics evolve in a k-dimensional subspace, while the shape of the set of predictive distributions is determined by m. Latent state belief is represented with a k-dimensional state vector and inference is carried out entirely in R^k, making RR-HMMs as computationally efficient as k-state HMMs yet more expressive. To learn RR-HMMs, we relax the assumptions of a recently proposed spectral learning algorithm for HMMs (Hsu, Kakade and Zhang 2009) and apply it to learn k-dimensional observable representations of rank-k RR-HMMs. The algorithm is consistent and free of local optima, and we extend its performance guarantees to cover the RR-...

  10. PKreport: report generation for checking population pharmacokinetic model assumptions

    Directory of Open Access Journals (Sweden)

    Li Jun

    2011-05-01

    Full Text Available Abstract Background Graphics play an important and unique role in population pharmacokinetic (PopPK model building by exploring hidden structure among data before modeling, evaluating model fit, and validating results after modeling. Results The work described in this paper is about a new R package called PKreport, which is able to generate a collection of plots and statistics for testing model assumptions, visualizing data and diagnosing models. The metric system is utilized as the currency for communicating between data sets and the package to generate special-purpose plots. It provides ways to match output from diverse software such as NONMEM, Monolix, R nlme package, etc. The package is implemented with S4 class hierarchy, and offers an efficient way to access the output from NONMEM 7. The final reports take advantage of the web browser as user interface to manage and visualize plots. Conclusions PKreport provides 1 a flexible and efficient R class to store and retrieve NONMEM 7 output, 2 automate plots for users to visualize data and models, 3 automatically generated R scripts that are used to create the plots; 4 an archive-oriented management tool for users to store, retrieve and modify figures, 5 high-quality graphs based on the R packages, lattice and ggplot2. The general architecture, running environment and statistical methods can be readily extended with R class hierarchy. PKreport is free to download at http://cran.r-project.org/web/packages/PKreport/index.html.

  11. Using frame correlation algorithm in a duration distribution based hidden Markov model

    Institute of Scientific and Technical Information of China (English)

    王作英; 崔小东

    2000-01-01

    The assumption of frame independence is a widely known weakness of traditional hidden Markov model (HMM). In this paper, a frame correlation algorithm based on the duration distribution based hidden Markov model (DDBHMM) is proposed. In the algorithm, an AR model is used to depict the low pass effect of vocal tract from which stems the inertia leading to frame correlation. In the preliminary experiment of middle vocabulary speaker dependent isolated word recognition, our frame correlation algorithm outperforms the frame independent one. The average error reduction is about 20% .

  12. Shattering world assumptions: A prospective view of the impact of adverse events on world assumptions.

    Science.gov (United States)

    Schuler, Eric R; Boals, Adriel

    2016-05-01

    Shattered Assumptions theory (Janoff-Bulman, 1992) posits that experiencing a traumatic event has the potential to diminish the degree of optimism in the assumptions of the world (assumptive world), which could lead to the development of posttraumatic stress disorder. Prior research assessed the assumptive world with a measure that was recently reported to have poor psychometric properties (Kaler et al., 2008). The current study had 3 aims: (a) to assess the psychometric properties of a recently developed measure of the assumptive world, (b) to retrospectively examine how prior adverse events affected the optimism of the assumptive world, and (c) to measure the impact of an intervening adverse event. An 8-week prospective design with a college sample (N = 882 at Time 1 and N = 511 at Time 2) was used to assess the study objectives. We split adverse events into those that were objectively or subjectively traumatic in nature. The new measure exhibited adequate psychometric properties. The report of a prior objective or subjective trauma at Time 1 was related to a less optimistic assumptive world. Furthermore, participants who experienced an intervening objectively traumatic event evidenced a decrease in optimistic views of the world compared with those who did not experience an intervening adverse event. We found support for Shattered Assumptions theory retrospectively and prospectively using a reliable measure of the assumptive world. We discuss future assessments of the measure of the assumptive world and clinical implications to help rebuild the assumptive world with current therapies. (PsycINFO Database Record

  13. From epistemology to hidden curriculum: Critical vs. 'commercial' pedagogic perspective

    Directory of Open Access Journals (Sweden)

    Marojević Jovana C.

    2016-01-01

    Full Text Available Knowledge or, more precisely, its power is one of central themes in critical pedagogy. Since they are interested in school as the site of social critique, aimed at social transformations, critically oriented pedagogues pay special attention to the relation of knowledge and power or, to simplify it, the function of knowledge in the reproduction of the existing (often oppressive social relations. Not recognizing school as a mere site of social, economic or cultural preservation, they often study epistemology on which modern school is founded (positivistic epistemology and its hidden curriculum who function so that they legitimate social reproductive function of the school in a continuous cycle of self-justification. Since a certain understanding of knowledge and its function reveals the hidden curriculum of a certain educational philosophy, and since this consequently changes school into a site of social transformation or social transmission, viewed from the critical position this is the subject of the analysis of our paper. By final sublimation and contrasting the opposite positivistic and critical positions we conclude that the hidden curriculum of the first is the curriculum of the soliloquies while the curriculum of the second, critical tendency is entirely of a dialogue nature. It is clear that uni-directedness of the hidden curriculum formed according the postulates of positivistic epistemology can contribute only to positivistic transmission and regeneration of the existing social order, while the discursivity of critically oriented school defines the relation towards society as two-way, transformational, active and emancipatory.

  14. On local-hidden-variable no-go theorems

    Science.gov (United States)

    Methot, A. A.

    2006-06-01

    The strongest attack against quantum mechanics came in 1935 in the form of a paper by Einstein, Podolsky, and Rosen. It was argued that the theory of quantum mechanics could not be called a complete theory of Nature, for every element of reality is not represented in the formalism as such. The authors then put forth a proposition: we must search for a theory where, upon knowing everything about the system, including possible hidden variables, one could make precise predictions concerning elements of reality. This project was ultimately doomed in 1964 with the work of Bell, who showed that the most general local hidden variable theory could not reproduce correlations that arise in quantum mechanics. There exist mainly three forms of no-go theorems for local hidden variable theories. Although almost every physicist knows the consequences of these no-go theorems, not every physicist is aware of the distinctions between the three or even their exact definitions. Thus, we will discuss here the three principal forms of no-go theorems for local hidden variable theories of Nature. We will define Bell theorems, Bell theorems without inequalities, and pseudo-telepathy. A discussion of the similarities and differences will follow.

  15. Defining excellence.

    Science.gov (United States)

    Mehl, B

    1993-05-01

    Excellence in the pharmacy profession, particularly pharmacy management, is defined. Several factors have a significant effect on the ability to reach a given level of excellence. The first is the economic and political climate in which pharmacists practice. Stricter controls, reduced resources, and the velocity of change all necessitate nurturing of values and a work ethic to maintain excellence. Excellence must be measured by the services provided with regard to the resources available; thus, the ability to achieve excellence is a true test of leadership and innovation. Excellence is also time dependent, and today's innovation becomes tomorrow's standard. Programs that raise the level of patient care, not those that aggrandize the profession, are the most important. In addition, basic services must be practiced at a level of excellence. Quality assessment is a way to improve care and bring medical treatment to a higher plane of excellence. For such assessment to be effective and not punitive, the philosophy of the program must be known, and the goal must be clear. Excellence in practice is dependent on factors such as political and social norms, standards of practice, available resources; perceptions, time, the motivation to progress to a higher level, and the continuous innovation required to reshape the profession to meet the needs of society.

  16. Evaluating The Markov Assumption For Web Usage Mining

    DEFF Research Database (Denmark)

    Jespersen, S.; Pedersen, Torben Bach; Thorhauge, J.

    2003-01-01

    Web usage mining concerns the discovery of common browsing patterns, i.e., pages requested in sequence, from web logs. To cope with the enormous amounts of data, several aggregated structures based on statistical models of web surfing have appeared, e.g., the Hypertext Probabilistic Grammar (HPG...... knowledge there has been no systematic study of the validity of the Markov assumption wrt.\\ web usage mining and the resulting quality of the mined browsing patterns. In this paper we systematically investigate the quality of browsing patterns mined from structures based on the Markov assumption. Formal...... measures of quality, based on the closeness of the mined patterns to the true traversal patterns, are defined and an extensive experimental evaluation is performed, based on two substantial real-world data sets. The results indicate that a large number of rules must be considered to achieve high quality...

  17. Life Support Baseline Values and Assumptions Document

    Science.gov (United States)

    Anderson, Molly S.; Ewert, Michael K.; Keener, John F.; Wagner, Sandra A.

    2015-01-01

    The Baseline Values and Assumptions Document (BVAD) provides analysts, modelers, and other life support researchers with a common set of values and assumptions which can be used as a baseline in their studies. This baseline, in turn, provides a common point of origin from which many studies in the community may depart, making research results easier to compare and providing researchers with reasonable values to assume for areas outside their experience. With the ability to accurately compare different technologies' performance for the same function, managers will be able to make better decisions regarding technology development.

  18. Managerial and Organizational Assumptions in the CMM's

    DEFF Research Database (Denmark)

    2008-01-01

    thinking about large production and manufacturing organisations (particularly in America) in the late industrial age. Many of the difficulties reported with CMMI can be attributed basing practice on these assumptions in organisations which have different cultures and management traditions, perhaps...... in different countries operating different economic and social models. Characterizing CMMI in this way opens the door to another question: are there other sets of organisational and management assumptions which would be better suited to other types of organisations operating in other cultural contexts?...

  19. Grammatical-Restrained Hidden Conditional Random Fields for Bioinformatics applications

    Directory of Open Access Journals (Sweden)

    Martelli Pier

    2009-10-01

    Full Text Available Abstract Background Discriminative models are designed to naturally address classification tasks. However, some applications require the inclusion of grammar rules, and in these cases generative models, such as Hidden Markov Models (HMMs and Stochastic Grammars, are routinely applied. Results We introduce Grammatical-Restrained Hidden Conditional Random Fields (GRHCRFs as an extension of Hidden Conditional Random Fields (HCRFs. GRHCRFs while preserving the discriminative character of HCRFs, can assign labels in agreement with the production rules of a defined grammar. The main GRHCRF novelty is the possibility of including in HCRFs prior knowledge of the problem by means of a defined grammar. Our current implementation allows regular grammar rules. We test our GRHCRF on a typical biosequence labeling problem: the prediction of the topology of Prokaryotic outer-membrane proteins. Conclusion We show that in a typical biosequence labeling problem the GRHCRF performs better than CRF models of the same complexity, indicating that GRHCRFs can be useful tools for biosequence analysis applications. Availability GRHCRF software is available under GPLv3 licence at the website http://www.biocomp.unibo.it/~savojard/biocrf-0.9.tar.gz.

  20. Causal Mediation Analysis: Warning! Assumptions Ahead

    Science.gov (United States)

    Keele, Luke

    2015-01-01

    In policy evaluations, interest may focus on why a particular treatment works. One tool for understanding why treatments work is causal mediation analysis. In this essay, I focus on the assumptions needed to estimate mediation effects. I show that there is no "gold standard" method for the identification of causal mediation effects. In…

  1. Managerial and Organizational Assumptions in the CMM's

    DEFF Research Database (Denmark)

    2008-01-01

    in different countries operating different economic and social models. Characterizing CMMI in this way opens the door to another question: are there other sets of organisational and management assumptions which would be better suited to other types of organisations operating in other cultural contexts?...

  2. Mexican-American Cultural Assumptions and Implications.

    Science.gov (United States)

    Carranza, E. Lou

    The search for presuppositions of a people's thought is not new. Octavio Paz and Samuel Ramos have both attempted to describe the assumptions underlying the Mexican character. Paz described Mexicans as private, defensive, and stoic, characteristics taken to the extreme in the "pachuco." Ramos, on the other hand, described Mexicans as…

  3. The homogeneous marginal utility of income assumption

    NARCIS (Netherlands)

    Demuynck, T.

    2015-01-01

    We develop a test to verify if every agent from a population of heterogeneous consumers has the same marginal utility of income function. This homogeneous marginal utility of income assumption is often (implicitly) used in applied demand studies because it has nice aggregation properties and facilit

  4. Mexican-American Cultural Assumptions and Implications.

    Science.gov (United States)

    Carranza, E. Lou

    The search for presuppositions of a people's thought is not new. Octavio Paz and Samuel Ramos have both attempted to describe the assumptions underlying the Mexican character. Paz described Mexicans as private, defensive, and stoic, characteristics taken to the extreme in the "pachuco." Ramos, on the other hand, described Mexicans as…

  5. Culturally Biased Assumptions in Counseling Psychology

    Science.gov (United States)

    Pedersen, Paul B.

    2003-01-01

    Eight clusters of culturally biased assumptions are identified for further discussion from Leong and Ponterotto's (2003) article. The presence of cultural bias demonstrates that cultural bias is so robust and pervasive that is permeates the profession of counseling psychology, even including those articles that effectively attack cultural bias…

  6. Extracurricular Business Planning Competitions: Challenging the Assumptions

    Science.gov (United States)

    Watson, Kayleigh; McGowan, Pauric; Smith, Paul

    2014-01-01

    Business planning competitions [BPCs] are a commonly offered yet under-examined extracurricular activity. Given the extent of sceptical comment about business planning, this paper offers what the authors believe is a much-needed critical discussion of the assumptions that underpin the provision of such competitions. In doing so it is suggested…

  7. On quantum algorithms for noncommutative hidden subgroups

    Energy Technology Data Exchange (ETDEWEB)

    Ettinger, M. [Los Alamos National Lab., NM (United States); Hoeyer, P. [Odense Univ. (Denmark)

    1998-12-01

    Quantum algorithms for factoring and discrete logarithm have previously been generalized to finding hidden subgroups of finite Abelian groups. This paper explores the possibility of extending this general viewpoint to finding hidden subgroups of noncommutative groups. The authors present a quantum algorithm for the special case of dihedral groups which determines the hidden subgroup in a linear number of calls to the input function. They also explore the difficulties of developing an algorithm to process the data to explicitly calculate a generating set for the subgroup. A general framework for the noncommutative hidden subgroup problem is discussed and they indicate future research directions.

  8. The OPERA hypothesis: assumptions and clarifications.

    Science.gov (United States)

    Patel, Aniruddh D

    2012-04-01

    Recent research suggests that musical training enhances the neural encoding of speech. Why would musical training have this effect? The OPERA hypothesis proposes an answer on the basis of the idea that musical training demands greater precision in certain aspects of auditory processing than does ordinary speech perception. This paper presents two assumptions underlying this idea, as well as two clarifications, and suggests directions for future research.

  9. On distributional assumptions and whitened cosine similarities

    DEFF Research Database (Denmark)

    Loog, Marco

    2008-01-01

    Recently, an interpretation of the whitened cosine similarity measure as a Bayes decision rule was proposed (C. Liu, "The Bayes Decision Rule Induced Similarity Measures,'' IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 29, no. 6, pp. 1086-1090, June 2007. This communication makes th...... the observation that some of the distributional assumptions made to derive this measure are very restrictive and, considered simultaneously, even inconsistent....

  10. How to Handle Assumptions in Synthesis

    Directory of Open Access Journals (Sweden)

    Roderick Bloem

    2014-07-01

    Full Text Available The increased interest in reactive synthesis over the last decade has led to many improved solutions but also to many new questions. In this paper, we discuss the question of how to deal with assumptions on environment behavior. We present four goals that we think should be met and review several different possibilities that have been proposed. We argue that each of them falls short in at least one aspect.

  11. Hidden Variable Theories and Quantum Nonlocality

    Science.gov (United States)

    Boozer, A. D.

    2009-01-01

    We clarify the meaning of Bell's theorem and its implications for the construction of hidden variable theories by considering an example system consisting of two entangled spin-1/2 particles. Using this example, we present a simplified version of Bell's theorem and describe several hidden variable theories that agree with the predictions of…

  12. Insight: Exploring Hidden Roles in Collaborative Play

    Directory of Open Access Journals (Sweden)

    Tricia Shi

    2015-06-01

    Full Text Available This paper looks into interaction modes between players in co-located, collaborative games. In particular, hidden traitor games, in which one or more players is secretly working against the group mission, has the effect of increasing paranoia and distrust between players, so this paper looks into the opposite of a hidden traitor – a hidden benefactor. Rather than sabotaging the group mission, the hidden benefactor would help the group achieve the end goal while still having a reason to stay hidden. The paper explores what games with such a role can look like and how the role changes player interactions. Finally, the paper addresses the divide between video game and board game interaction modes; hidden roles are not common within video games, but they are of growing prevalence in board games. This fact, combined with the exploration of hidden benefactors, reveals that hidden roles is a mechanic that video games should develop into in order to match board games’ complexity of player interaction modes.

  13. Heating up the Galaxy with hidden photons

    Energy Technology Data Exchange (ETDEWEB)

    Dubovsky, Sergei [Center for Cosmology and Particle Physics, Department of Physics, New York University,New York, NY, 10003 (United States); Hernández-Chifflet, Guzmán [Center for Cosmology and Particle Physics, Department of Physics, New York University,New York, NY, 10003 (United States); Instituto de Física, Facultad de Ingeniería, Universidad de la República,Montevideo, 11300 (Uruguay)

    2015-12-29

    We elaborate on the dynamics of ionized interstellar medium in the presence of hidden photon dark matter. Our main focus is the ultra-light regime, where the hidden photon mass is smaller than the plasma frequency in the Milky Way. We point out that as a result of the Galactic plasma shielding direct detection of ultra-light photons in this mass range is especially challenging. However, we demonstrate that ultra-light hidden photon dark matter provides a powerful heating source for the ionized interstellar medium. This results in a strong bound on the kinetic mixing between hidden and regular photons all the way down to the hidden photon masses of order 10{sup −20} eV.

  14. Hidden Web信息获取

    Institute of Scientific and Technical Information of China (English)

    陈珂; 陈小英; 徐科

    2007-01-01

    如今Web上越来越多的信息可以通过查询接口获得,但为了获取某Hidden Web站点的页面,用户不得不键入一系列的关键词.由于没有直接指向Hidden Web页面的静态链接,当前大多搜索引擎不能发现和索引这些页面.然而,研究表明,由Hidden Web站点提供的高质量的信息对许多用户来说非常有价值.文章通过研究针对特定类型的表单,建立一个有效的Hidden Web爬虫,以便获取Hidden Web后台数据库信息.

  15. Hidden Markov models in automatic speech recognition

    Science.gov (United States)

    Wrzoskowicz, Adam

    1993-11-01

    This article describes a method for constructing an automatic speech recognition system based on hidden Markov models (HMMs). The author discusses the basic concepts of HMM theory and the application of these models to the analysis and recognition of speech signals. The author provides algorithms which make it possible to train the ASR system and recognize signals on the basis of distinct stochastic models of selected speech sound classes. The author describes the specific components of the system and the procedures used to model and recognize speech. The author discusses problems associated with the choice of optimal signal detection and parameterization characteristics and their effect on the performance of the system. The author presents different options for the choice of speech signal segments and their consequences for the ASR process. The author gives special attention to the use of lexical, syntactic, and semantic information for the purpose of improving the quality and efficiency of the system. The author also describes an ASR system developed by the Speech Acoustics Laboratory of the IBPT PAS. The author discusses the results of experiments on the effect of noise on the performance of the ASR system and describes methods of constructing HMM's designed to operate in a noisy environment. The author also describes a language for human-robot communications which was defined as a complex multilevel network from an HMM model of speech sounds geared towards Polish inflections. The author also added mandatory lexical and syntactic rules to the system for its communications vocabulary.

  16. Hidden scale invariance of metals

    DEFF Research Database (Denmark)

    Hummel, Felix; Kresse, Georg; Dyre, Jeppe C.

    2015-01-01

    available. Hidden scale invariance is demonstrated in detail for magnesium by showing invariance of structure and dynamics. Computed melting curves of period three metals follow curves with invariance (isomorphs). The experimental structure factor of magnesium is predicted by assuming scale invariant...... of metals making the condensed part of the thermodynamic phase diagram effectively one dimensional with respect to structure and dynamics. DFT computed density scaling exponents, related to the Grüneisen parameter, are in good agreement with experimental values for the 16 elements where reliable data were......Density functional theory (DFT) calculations of 58 liquid elements at their triple point show that most metals exhibit near proportionality between the thermal fluctuations of the virial and the potential energy in the isochoric ensemble. This demonstrates a general “hidden” scale invariance...

  17. Hidden scale in quantum mechanics

    CERN Document Server

    Giri, Pulak Ranjan

    2007-01-01

    We show that the intriguing localization of a free particle wave-packet is possible due to a hidden scale present in the system. Self-adjoint extensions (SAE) is responsible for introducing this scale in quantum mechanical models through the nontrivial boundary conditions. We discuss a couple of classically scale invariant free particle systems to illustrate the issue. In this context it has been shown that a free quantum particle moving on a full line may have localized wave-packet around the origin. As a generalization, it has also been shown that particles moving on a portion of a plane or on a portion of a three dimensional space can have unusual localized wave-packet.

  18. Closed World Assumption for Disjunctive Reasoning

    Institute of Scientific and Technical Information of China (English)

    WANG Kewen; ZHOU Lizhu

    2001-01-01

    In this paper, the relationship between argumentation and closed world reasoning for disjunctive information is studied. In particular, the authors propose a simple and intuitive generalization of the closed world assumption (CWA) for general disjunctive deductive databases (with default negation). This semantics,called DCWA, allows a natural argumentation-based interpretation and can be used to represent reasoning for disjunctive information. We compare DCWA with GCWA and prove that DCWA extends Minker's GCWA to the class of disjunctive databases with default negation. Also we compare our semantics with some related approaches.In addition, the computational complexity of DCWA is investigated.

  19. Limiting assumptions in molecular modeling: electrostatics.

    Science.gov (United States)

    Marshall, Garland R

    2013-02-01

    Molecular mechanics attempts to represent intermolecular interactions in terms of classical physics. Initial efforts assumed a point charge located at the atom center and coulombic interactions. It is been recognized over multiple decades that simply representing electrostatics with a charge on each atom failed to reproduce the electrostatic potential surrounding a molecule as estimated by quantum mechanics. Molecular orbitals are not spherically symmetrical, an implicit assumption of monopole electrostatics. This perspective reviews recent evidence that requires use of multipole electrostatics and polarizability in molecular modeling.

  20. Promoter recognition based on the maximum entropy hidden Markov model.

    Science.gov (United States)

    Zhao, Xiao-yu; Zhang, Jin; Chen, Yuan-yuan; Li, Qiang; Yang, Tao; Pian, Cong; Zhang, Liang-yun

    2014-08-01

    Since the fast development of genome sequencing has produced large scale data, the current work uses the bioinformatics methods to recognize different gene regions, such as exon, intron and promoter, which play an important role in gene regulations. In this paper, we introduce a new method based on the maximum entropy Markov model (MEMM) to recognize the promoter, which utilizes the biological features of the promoter for the condition. However, it leads to a high false positive rate (FPR). In order to reduce the FPR, we provide another new method based on the maximum entropy hidden Markov model (ME-HMM) without the independence assumption, which could also accommodate the biological features effectively. To demonstrate the precision, the new methods are implemented by R language and the hidden Markov model (HMM) is introduced for comparison. The experimental results show that the new methods may not only overcome the shortcomings of HMM, but also have their own advantages. The results indicate that, MEMM is excellent for identifying the conserved signals, and ME-HMM can demonstrably improve the true positive rate.

  1. 39 Questionable Assumptions in Modern Physics

    Science.gov (United States)

    Volk, Greg

    2009-03-01

    The growing body of anomalies in new energy, low energy nuclear reactions, astrophysics, atomic physics, and entanglement, combined with the failure of the Standard Model and string theory to predict many of the most basic fundamental phenomena, all point to a need for major new paradigms. Not Band-Aids, but revolutionary new ways of conceptualizing physics, in the spirit of Thomas Kuhn's The Structure of Scientific Revolutions. This paper identifies a number of long-held, but unproven assumptions currently being challenged by an increasing number of alternative scientists. Two common themes, both with venerable histories, keep recurring in the many alternative theories being proposed: (1) Mach's Principle, and (2) toroidal, vortex particles. Matter-based Mach's Principle differs from both space-based universal frames and observer-based Einsteinian relativity. Toroidal particles, in addition to explaining electron spin and the fundamental constants, satisfy the basic requirement of Gauss's misunderstood B Law, that motion itself circulates. Though a comprehensive theory is beyond the scope of this paper, it will suggest alternatives to the long list of assumptions in context.

  2. Inference with Constrained Hidden Markov Models in PRISM

    CERN Document Server

    Christiansen, Henning; Lassen, Ole Torp; Petit, Matthieu

    2010-01-01

    A Hidden Markov Model (HMM) is a common statistical model which is widely used for analysis of biological sequence data and other sequential phenomena. In the present paper we show how HMMs can be extended with side-constraints and present constraint solving techniques for efficient inference. Defining HMMs with side-constraints in Constraint Logic Programming have advantages in terms of more compact expression and pruning opportunities during inference. We present a PRISM-based framework for extending HMMs with side-constraints and show how well-known constraints such as cardinality and all different are integrated. We experimentally validate our approach on the biologically motivated problem of global pairwise alignment.

  3. Inference in Hidden Markov Models with Explicit State Duration Distributions

    CERN Document Server

    Dewar, Michael; Wood, Frank

    2012-01-01

    In this letter we borrow from the inference techniques developed for unbounded state-cardinality (nonparametric) variants of the HMM and use them to develop a tuning-parameter free, black-box inference procedure for Explicit-state-duration hidden Markov models (EDHMM). EDHMMs are HMMs that have latent states consisting of both discrete state-indicator and discrete state-duration random variables. In contrast to the implicit geometric state duration distribution possessed by the standard HMM, EDHMMs allow the direct parameterisation and estimation of per-state duration distributions. As most duration distributions are defined over the positive integers, truncation or other approximations are usually required to perform EDHMM inference.

  4. Hidden torsion, 3-manifolds, and homology cobordism

    CERN Document Server

    Cha, Jae Choon

    2011-01-01

    This paper continues our exploration of homology cobordism of 3-manifolds using our recent results on Cheeger-Gromov rho-invariants associated to amenable representations. We introduce a new type of torsion in 3-manifold groups we call hidden torsion, and an algebraic approximation we call local hidden torsion. We construct infinitely many hyperbolic 3-manifolds which have local hidden torsion in the transfinite lower central subgroup. By realizing Cheeger-Gromov invariants over amenable groups, we show that our hyperbolic 3-manifolds are not pairwise homology cobordant, yet remain indistinguishable by any prior known homology cobordism invariants.

  5. A survey of hidden-variables theories

    CERN Document Server

    Belinfante, F J

    1973-01-01

    A Survey of Hidden-Variables Theories is a three-part book on the hidden-variable theories, referred in this book as """"theories of the first kind"""". Part I reviews the motives in developing different types of hidden-variables theories. The quest for determinism led to theories of the first kind; the quest for theories that look like causal theories when applied to spatially separated systems that interacted in the past led to theories of the second kind. Parts II and III further describe the theories of the first kind and second kind, respectively. This book is written to make the literat

  6. Visible Effects of Invisible Hidden Valley Radiation

    CERN Document Server

    Carloni, Lisa

    2010-01-01

    Assuming there is a new gauge group in a Hidden Valley, and a new type of radiation, can we observe it through its effect on the kinematic distributions of recoiling visible particles? Specifically, what are the collider signatures of radiation in a hidden sector? We address these questions using a generic SU(N)-like Hidden Valley model that we implement in Pythia. We find that in both the e+e- and the LHC cases the kinematic distributions of the visible particles can be significantly affected by the valley radiation. Without a proper understanding of such effects, inferred masses of "communicators" and of invisible particles can be substantially off.

  7. The extended evolutionary synthesis: its structure, assumptions and predictions

    Science.gov (United States)

    Laland, Kevin N.; Uller, Tobias; Feldman, Marcus W.; Sterelny, Kim; Müller, Gerd B.; Moczek, Armin; Jablonka, Eva; Odling-Smee, John

    2015-01-01

    Scientific activities take place within the structured sets of ideas and assumptions that define a field and its practices. The conceptual framework of evolutionary biology emerged with the Modern Synthesis in the early twentieth century and has since expanded into a highly successful research program to explore the processes of diversification and adaptation. Nonetheless, the ability of that framework satisfactorily to accommodate the rapid advances in developmental biology, genomics and ecology has been questioned. We review some of these arguments, focusing on literatures (evo-devo, developmental plasticity, inclusive inheritance and niche construction) whose implications for evolution can be interpreted in two ways—one that preserves the internal structure of contemporary evolutionary theory and one that points towards an alternative conceptual framework. The latter, which we label the ‘extended evolutionary synthesis' (EES), retains the fundaments of evolutionary theory, but differs in its emphasis on the role of constructive processes in development and evolution, and reciprocal portrayals of causation. In the EES, developmental processes, operating through developmental bias, inclusive inheritance and niche construction, share responsibility for the direction and rate of evolution, the origin of character variation and organism–environment complementarity. We spell out the structure, core assumptions and novel predictions of the EES, and show how it can be deployed to stimulate and advance research in those fields that study or use evolutionary biology. PMID:26246559

  8. Catalyst Deactivation: Control Relevance of Model Assumptions

    Directory of Open Access Journals (Sweden)

    Bernt Lie

    2000-10-01

    Full Text Available Two principles for describing catalyst deactivation are discussed, one based on the deactivation mechanism, the other based on the activity and catalyst age distribution. When the model is based upon activity decay, it is common to use a mean activity developed from the steady-state residence time distribution. We compare control-relevant properties of such an approach with those of a model based upon the deactivation mechanism. Using a continuous stirred tank reactor as an example, we show that the mechanistic approach and the population balance approach lead to identical models. However, common additional assumptions used for activity-based models lead to model properties that may deviate considerably from the correct one.

  9. Inference and Assumption in Historical Seismology

    Science.gov (United States)

    Musson, R. M. W.

    The principal aim in studies of historical earthquakes is usually to be able to derive parameters for past earthquakes from macroseismic or other data and thus extend back in time parametric earthquake catalogues, often with improved seismic hazard studies as the ultimate goal. In cases of relatively recent historical earthquakes, for example, those of the 18th and 19th centuries, it is often the case that there is such an abundance of available macroseismic data that estimating earthquake parameters is relatively straightforward. For earlier historical periods, especially medieval and earlier, and also for areas where settlement or documentation are sparse, the situation is much harder. The seismologist often finds that he has only a few data points (or even one) for an earthquake that nevertheless appears to be regionally significant.In such cases, it is natural that the investigator will attempt to make the most of the available data, expanding it by making working assumptions, and from these deriving conclusions by inference (i.e. the process of proceeding logically from some premise). This can be seen in a number of existing studies; in some cases extremely slight data are so magnified by the use of inference that one must regard the results as tentative in the extreme. Two main types of inference can be distinguished. The first type is inference from documentation. This is where assumptions are made such as: the absence of a report of the earthquake from this monastic chronicle indicates that at this locality the earthquake was not felt. The second type is inference from seismicity. Here one deals with arguments such as all recent earthquakes felt at town X are events occurring in seismic zone Y, therefore this ancient earthquake which is only reported at town X probably also occurred in this zone.

  10. Hidden systematics of fission channels

    Directory of Open Access Journals (Sweden)

    Schmidt Karl-Heinz

    2013-12-01

    of the fissioning system obey a hidden systematics that can be explained by the number of states in the vicinity of the outer fission barrier as a function of mass asymmetry, if the potential is constructed as the sum of the macroscopic contribution of the compound nucleus and empirically determined fragment shells. This hidden systematics also explains the transition from asymmetric to symmetric fission around 226Th and around 258Fm.

  11. Dynamic Group Diffie-Hellman Key Exchange under standard assumptions

    Energy Technology Data Exchange (ETDEWEB)

    Bresson, Emmanuel; Chevassut, Olivier; Pointcheval, David

    2002-02-14

    Authenticated Diffie-Hellman key exchange allows two principals communicating over a public network, and each holding public-private keys, to agree on a shared secret value. In this paper we study the natural extension of this cryptographic problem to a group of principals. We begin from existing formal security models and refine them to incorporate major missing details (e.g., strong-corruption and concurrent sessions). Within this model we define the execution of a protocol for authenticated dynamic group Diffie-Hellman and show that it is provably secure under the decisional Diffie-Hellman assumption. Our security result holds in the standard model and thus provides better security guarantees than previously published results in the random oracle model.

  12. Coding with partially hidden Markov models

    DEFF Research Database (Denmark)

    Forchhammer, Søren; Rissanen, J.

    1995-01-01

    Partially hidden Markov models (PHMM) are introduced. They are a variation of the hidden Markov models (HMM) combining the power of explicit conditioning on past observations and the power of using hidden states. (P)HMM may be combined with arithmetic coding for lossless data compression. A general...... 2-part coding scheme for given model order but unknown parameters based on PHMM is presented. A forward-backward reestimation of parameters with a redefined backward variable is given for these models and used for estimating the unknown parameters. Proof of convergence of this reestimation is given....... The PHMM structure and the conditions of the convergence proof allows for application of the PHMM to image coding. Relations between the PHMM and hidden Markov models (HMM) are treated. Results of coding bi-level images with the PHMM coding scheme is given. The results indicate that the PHMM can adapt...

  13. UV Photography Shows Hidden Sun Damage

    Science.gov (United States)

    ... mcat1=de12", ]; for (var c = 0; c UV photography shows hidden sun damage A UV photograph gives ... developing skin cancer and prematurely aged skin. Normal photography UV photography 18 months of age: This boy's ...

  14. Faddeev-Jackiw approach to hidden symmetries

    CERN Document Server

    Wotzasek, C

    1994-01-01

    The study of hidden symmetries within Dirac's formalism does not possess a systematic procedure due to the lack of first-class constraints to act as symmetry generators. On the other hand, in the Faddeev-Jackiw approach, gauge and reparametrization symmetries are generated by the null eigenvectors of the sympletic matrix and not by constraints, suggesting the possibility of dealing systematically with hidden symmetries through this formalism. It is shown in this paper that indeed hidden symmetries of noninvariant or gauge fixed systems are equally well described by null eigenvectors of the sympletic matrix, just as the explicit invariances. The Faddeev-Jackiw approach therefore provide a systematic algorithm for treating all sorts of symmetries in an unified way. This technique is illustrated here by the SL(2,R) Kac-Moody current algebra of the 2-D induced gravity proposed by Polyakov, which is a hidden symmetry in the canonical approach of constrained systems via Dirac's method, after conformal and reparamet...

  15. Fibroid Tumors in Women: A Hidden Epidemic?

    Science.gov (United States)

    ... Issue Past Issues Fibroid Tumors in Women: A Hidden Epidemic? Past Issues / Spring 2007 Table of Contents ... fibroids@rics.bwh.harvard.edu , or visit our Web site: www.fibroids.net . You may also write ...

  16. Hidden figures are ever present.

    Science.gov (United States)

    Mens, L H; Leeuwenberg, E L

    1988-11-01

    Preference judgments about alternative interpretations of unambiguous patterns can be explained in terms of a rivalry between a preferred and a second-best interpretation (cf. Leeuwenberg & Buffart, 1983). We tested whether this second-best interpretation corresponds to a suppressed but concurrently present interpretation or whether it merely reflects an alternative view that happens to be preferred less often. Two patterns were present immediately following each other with a very short onset asynchrony: a complete pattern and one out of three possible subpatterns of it, corresponding to the best, the second best, or an odd interpretation of the complete pattern. Subjects indicated which subpattern was presented by choosing among the three subpatterns shown after each trial. The scores, corrected for response-bias effects, indicated a relative facilitation of the second-best interpretation, in agreement with its predicted "hidden" presence. This result is more in line with theories that capitalize on the quality of the finally selected representation than with processing models aimed at reaching one single solution as fast and as economically as possible.

  17. Hidden Local Symmetry and Beyond

    CERN Document Server

    Yamawaki, Koichi

    2016-01-01

    Gerry Brown was a godfather of our hidden local symmetry (HLS) for the vector meson from the birth of the theory throughout his life. The HLS is originated from very nature of the nonlinear realization of the symmetry G based on the manifold G/H, and thus is universal to any physics based on the nonlinear realization. Here I focus on the Higgs Lagrangian of the Standard Model (SM), which is shown to be equivalent to the nonlinear sigma model based on G/H= SU(2)_L x SU(2)_R/SU(2)_V with additional symmetry, the nonlinearly realized scale symmetry. Then the SM does have a dynamical gauge boson of the SU(2)_V HLS, "SM rho meson", in addition to the Higgs as a pseudo dilaton as well as the NG bosons to be absorbed into the W and Z. Based on the recent work done with S. Matsuzaki and H. Ohki, I discuss a novel possibility that the SM rho meson acquires kinetic term by the SM dynamics itself, which then stabilizes the skyrmion dormant in the SM as a viable candidate for the dark matter, what we call "Dark SM skyrmi...

  18. Hidden local symmetry and beyond

    Science.gov (United States)

    Yamawaki, Koichi

    Gerry Brown was a godfather of our hidden local symmetry (HLS) for the vector meson from the birth of the theory throughout his life. The HLS is originated from very nature of the nonlinear realization of the symmetry G based on the manifold G/H, and thus is universal to any physics based on the nonlinear realization. Here, I focus on the Higgs Lagrangian of the Standard Model (SM), which is shown to be equivalent to the nonlinear sigma model based on G/H = SU(2)L × SU(2)R/SU(2)V with additional symmetry, the nonlinearly-realized scale symmetry. Then, the SM does have a dynamical gauge boson of the SU(2)V HLS, "SM ρ meson", in addition to the Higgs as a pseudo-dilaton as well as the NG bosons to be absorbed in to the W and Z. Based on the recent work done with Matsuzaki and Ohki, I discuss a novel possibility that the SM ρ meson acquires kinetic term by the SM dynamics itself, which then stabilizes the skyrmion dormant in the SM as a viable candidate for the dark matter, what we call "dark SM skyrmion (DSMS)".

  19. Constraining solar hidden photons using HPGe detector

    Energy Technology Data Exchange (ETDEWEB)

    Horvat, R.; Kekez, D., E-mail: Dalibor.Kekez@irb.hr; Krčmar, M.; Krečak, Z.; Ljubičić, A.

    2013-04-25

    In this Letter we report on the results of our search for photons from a U(1) gauge factor in the hidden sector of the full theory. With our experimental setup we observe the single spectrum in a HPGe detector arising as a result of the photoelectric-like absorption of hidden photons emitted from the Sun on germanium atoms inside the detector. The main ingredient of the theory used in our analysis, a severely constrained kinetic mixing from the two U(1) gauge factors and massive hidden photons, entails both photon into hidden state oscillations and a minuscule coupling of hidden photons to visible matter, of which the latter our experimental setup has been designed to observe. On a theoretical side, full account was taken of the effects of refraction and damping of photons while propagating in Sun's interior as well as in the detector. We exclude hidden photons with kinetic couplings χ>(2.2×10{sup −13}–3×10{sup −7}) in the mass region 0.2 eV≲m{sub γ{sup ′}}≲30 keV. Our constraints on the mixing parameter χ in the mass region from 20 eV up to 15 keV prove even slightly better then those obtained recently by using data from the CAST experiment, albeit still somewhat weaker than those obtained from solar and HB stars lifetime arguments.

  20. Towards New Probabilistic Assumptions in Business Intelligence

    Directory of Open Access Journals (Sweden)

    Schumann Andrew

    2015-01-01

    Full Text Available One of the main assumptions of mathematical tools in science is represented by the idea of measurability and additivity of reality. For discovering the physical universe additive measures such as mass, force, energy, temperature, etc. are used. Economics and conventional business intelligence try to continue this empiricist tradition and in statistical and econometric tools they appeal only to the measurable aspects of reality. However, a lot of important variables of economic systems cannot be observable and additive in principle. These variables can be called symbolic values or symbolic meanings and studied within symbolic interactionism, the theory developed since George Herbert Mead and Herbert Blumer. In statistical and econometric tools of business intelligence we accept only phenomena with causal connections measured by additive measures. In the paper we show that in the social world we deal with symbolic interactions which can be studied by non-additive labels (symbolic meanings or symbolic values. For accepting the variety of such phenomena we should avoid additivity of basic labels and construct a new probabilistic method in business intelligence based on non-Archimedean probabilities.

  1. First Direct-Detection Constraints on eV-Scale Hidden-Photon Dark Matter with DAMIC at SNOLAB

    Energy Technology Data Exchange (ETDEWEB)

    Aguilar-Arevalo, A.; Amidei, D.; Bertou, X.; Butner, M.; Cancelo, G.; Castañeda Vázquez, A.; Cervantes Vergara, B. A.; Chavarria, A. E.; Chavez, C. R.; de Mello Neto, J. R. T.; D’Olivo, J. C.; Estrada, J.; Fernandez Moroni, G.; Gaïor, R.; Guardincerri, Y.; Hernández Torres, K. P.; Izraelevitch, F.; Kavner, A.; Kilminster, B.; Lawson, I.; Letessier-Selvon, A.; Liao, J.; Matalon, A.; Mello, V. B. B.; Molina, J.; Privitera, P.; Ramanathan, K.; Sarkis, Y.; Schwarz, T.; Settimo, M.; Sofo Haro, M.; Thomas, R.; Tiffenberg, J.; Tiouchichine, E.; Torres Machado, D.; Trillaud, F.; You, X.; Zhou, J.

    2017-04-05

    We present direct detection constraints on the absorption of hidden-photon dark matter with particle masses in the range 1.2-30 eV$c^{-2}$ with the DAMIC experiment at SNOLAB. Under the assumption that the local dark matter is entirely constituted of hidden photons, the sensitivity to the kinetic mixing parameter $\\kappa$ is competitive with constraints from solar emission, reaching a minimum value of 2.2$\\times$$10^{-14}$ at 17 eV$c^{-2}$. These results are the most stringent direct detection constraints on hidden-photon dark matter with masses 3-12 eV$c^{-2}$ and the first demonstration of direct experimental sensitivity to ionization signals $<$12 eV from dark matter interactions.

  2. First direct detection constraints on eV-scale hidden-photon dark matter with DAMIC at SNOLAB

    CERN Document Server

    Aguilar-Arevalo, A; Bertou, X; Butner, M; Cancelo, G; Vázquez, A Castañeda; Vergara, B A Cervantes; Chavarria, A E; Chavez, C R; Neto, J R T de Mello; D'Olivo, J C; Estrada, J; Moroni, G Fernandez; Gaïor, R; Guardincerri, Y; Torres, K P Hernández; Izraelevitch, F; Kavner, A; Kilminster, B; Lawson, I; Letessier-Selvon, A; Liao, J; Matalon, A; Mello, V B B; Molina, J; Privitera, P; Ramanathan, K; Sarkis, Y; Schwarz, T; Settimo, M; Haro, M Sofo; Thomas, R; Tiffenberg, J; Tiouchichine, E; Machado, D Torres; Trillaud, F; You, X; Zhou, J

    2016-01-01

    We present direct detection constraints on the absorption of hidden-photon dark matter with particle masses in the range 1.2-30 eV$c^{-2}$ with the DAMIC experiment at SNOLAB. Under the assumption that the local dark matter is entirely constituted of hidden photons, the sensitivity to the kinetic mixing parameter $\\kappa$ is competitive with constraints from solar emission, reaching a minimum value of 2.2$\\times$$10^{-14}$ at 17 eV$c^{-2}$. These results are the most stringent direct detection constraints on hidden-photon dark matter with masses 3-12 eV$c^{-2}$ and the first demonstration of direct experimental sensitivity to ionization signals $<$12 eV from dark matter interactions.

  3. Probing hidden sector photons through the Higgs window

    Energy Technology Data Exchange (ETDEWEB)

    Ahlers, M. [Oxford Univ. (United Kingdom). Rudolf Peierls Centre for Theoretical Physics; Jaeckel, J. [Durham Univ. (United Kingdom). Inst. for Particle Physics and Phenomenology; Redondo, J.; Ringwald, A. [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany)

    2008-07-15

    We investigate the possibility that a (light) hidden sector extra photon receives its mass via spontaneous symmetry breaking of a hidden sector Higgs boson, the so-called hidden-Higgs. The hidden-photon can mix with the ordinary photon via a gauge kinetic mixing term. The hidden-Higgs can couple to the Standard Model Higgs via a renormalizable quartic term - sometimes called the Higgs Portal. We discuss the implications of this light hidden-Higgs in the context of laser polarization and light-shining-through-the-wall experiments as well as cosmological, astrophysical, and non-Newtonian force measurements. For hidden-photons receiving their mass from a hidden-Higgs we find in the small mass regime significantly stronger bounds than the bounds on massive hidden sector photons alone. (orig.)

  4. The hidden simplicity of biology

    Science.gov (United States)

    Davies, Paul C. W.; Imari Walker, Sara

    2016-10-01

    Life is so remarkable, and so unlike any other physical system, that it is tempting to attribute special factors to it. Physics is founded on the assumption that universal laws and principles underlie all natural phenomena, but is it far from clear that there are ‘laws of life’ with serious descriptive or predictive power analogous to the laws of physics. Nor is there (yet) a ‘theoretical biology’ in the same sense as theoretical physics. Part of the obstacle in developing a universal theory of biological organization concerns the daunting complexity of living organisms. However, many attempts have been made to glimpse simplicity lurking within this complexity, and to capture this simplicity mathematically. In this paper we review a promising new line of inquiry to bring coherence and order to the realm of biology by focusing on ‘information’ as a unifying concept.

  5. Roy's specific life values and the philosophical assumption of humanism.

    Science.gov (United States)

    Hanna, Debra R

    2013-01-01

    Roy's philosophical assumption of humanism, which is shaped by the veritivity assumption, is considered in terms of her specific life values and in contrast to the contemporary view of humanism. Like veritivity, Roy's philosophical assumption of humanism unites a theocentric focus with anthropological values. Roy's perspective enriches the mainly secular, anthropocentric assumption. In this manuscript, the basis for Roy's perspective of humanism will be discussed so that readers will be able to use the Roy adaptation model in an authentic manner.

  6. Using a Multi-Cathode Counter (MCC) in the Search for Hidden Photon CDM

    CERN Document Server

    Kopylov, A V; Petukhov, V V

    2015-01-01

    We report on a new technique of a Multi-Cathode Counter (MCC) developed to search for hidden photon (HP) cold dark matter (CDM) with a mass from 5 to 10 eV. The method suggested in the assumption that hidden photons of the mass greater than a work function of the metal, the cathode of the counter is fabricated induce emission of single electrons from a cathode. Three configurations of the same counter are used to measure the count rates R1, R2 and R3 of the single electron events sequentially each week, where the difference R1- R2 measures the effect from HP and R3 is used as a reference sequence to monitor the counting process. At present the work is aimed to refine the procedure of data treatment and to look for long term variations which should be accounted for in the final analysis of data.

  7. Lepton mixing from the hidden sector

    CERN Document Server

    Ludl, P O

    2015-01-01

    Experimental results indicate a possible relation between the lepton and quark mixing matrices of the form U_PMNS \\approx V_CKM^\\dagger U_X, where U_X is a matrix with special structure related to the mechanism of neutrino mass generation. We propose a framework which can realize such a relation. The main ingredients of the framework are the double seesaw mechanism, SO(10) Grand Unification and a hidden sector of theory. The latter is composed of singlets (fermions and bosons) of the GUT symmetry with masses between the GUT and Planck scale. The interactions in this sector obey certain symmetries G_hidden. We explore the conditions under which symmetries G_hidden can produce flavour structures in the visible sector. Here the key elements are the basis-fixing symmetry and mediators which communicate information about properties of the hidden sector to the visible one. The interplay of SO(10) symmetry, basis-fixing symmetry identified as Z2 x Z2 and G_hidden can lead to the required form of U_X. A different kin...

  8. Fitting Hidden Markov Models to Psychological Data

    Directory of Open Access Journals (Sweden)

    Ingmar Visser

    2002-01-01

    Full Text Available Markov models have been used extensively in psychology of learning. Applications of hidden Markov models are rare however. This is partially due to the fact that comprehensive statistics for model selection and model assessment are lacking in the psychological literature. We present model selection and model assessment statistics that are particularly useful in applying hidden Markov models in psychology. These statistics are presented and evaluated by simulation studies for a toy example. We compare AIC, BIC and related criteria and introduce a prediction error measure for assessing goodness-of-fit. In a simulation study, two methods of fitting equality constraints are compared. In two illustrative examples with experimental data we apply selection criteria, fit models with constraints and assess goodness-of-fit. First, data from a concept identification task is analyzed. Hidden Markov models provide a flexible approach to analyzing such data when compared to other modeling methods. Second, a novel application of hidden Markov models in implicit learning is presented. Hidden Markov models are used in this context to quantify knowledge that subjects express in an implicit learning task. This method of analyzing implicit learning data provides a comprehensive approach for addressing important theoretical issues in the field.

  9. The zero-sum assumption in neutral biodiversity theory

    NARCIS (Netherlands)

    Etienne, Rampal S.; Alonso, David; McKane, Alan J.

    2007-01-01

    The neutral theory of biodiversity as put forward by Hubbell in his 2001 monograph has received much criticism for its unrealistic simplifying assumptions. These are the assumptions of functional equivalence among different species (neutrality), the assumption of point mutation speciation, and the a

  10. The zero-sum assumption in neutral biodiversity theory

    NARCIS (Netherlands)

    Etienne, R.S.; Alonso, D.; McKane, A.J.

    2007-01-01

    The neutral theory of biodiversity as put forward by Hubbell in his 2001 monograph has received much criticism for its unrealistic simplifying assumptions. These are the assumptions of functional equivalence among different species (neutrality), the assumption of point mutation speciation, and the

  11. Philosophy of Technology Assumptions in Educational Technology Leadership

    Science.gov (United States)

    Webster, Mark David

    2017-01-01

    A qualitative study using grounded theory methods was conducted to (a) examine what philosophy of technology assumptions are present in the thinking of K-12 technology leaders, (b) investigate how the assumptions may influence technology decision making, and (c) explore whether technological determinist assumptions are present. Subjects involved…

  12. Philosophy of Technology Assumptions in Educational Technology Leadership

    Science.gov (United States)

    Webster, Mark David

    2017-01-01

    A qualitative study using grounded theory methods was conducted to (a) examine what philosophy of technology assumptions are present in the thinking of K-12 technology leaders, (b) investigate how the assumptions may influence technology decision making, and (c) explore whether technological determinist assumptions are present. Subjects involved…

  13. Probing Hidden Sector Photons through the Higgs Window.

    OpenAIRE

    Ahlers, M.; Jaeckel, J; Redondo, J.; Ringwald, A.

    2008-01-01

    We investigate the possibility that a (light) hidden sector extra photon receives its mass via spontaneous symmetry breaking of a hidden sector Higgs boson, the so-called hidden-Higgs. The hidden-photon can mix with the ordinary photon via a gauge kinetic mixing term. The hidden-Higgs can couple to the Standard Model Higgs via a renormalizable quartic term - sometimes called the Higgs Portal. We discuss the implications of this light hidden-Higgs in the context of laser polarization and light...

  14. Statistical Tests of the PTHA Poisson Assumption for Submarine Landslides

    Science.gov (United States)

    Geist, E. L.; Chaytor, J. D.; Parsons, T.; Ten Brink, U. S.

    2012-12-01

    We demonstrate that a sequence of dated mass transport deposits (MTDs) can provide information to statistically test whether or not submarine landslides associated with these deposits conform to a Poisson model of occurrence. Probabilistic tsunami hazard analysis (PTHA) most often assumes Poissonian occurrence for all sources, with an exponential distribution of return times. Using dates that define the bounds of individual MTDs, we first describe likelihood and Monte Carlo methods of parameter estimation for a suite of candidate occurrence models (Poisson, lognormal, gamma, Brownian Passage Time). In addition to age-dating uncertainty, both methods incorporate uncertainty caused by the open time intervals: i.e., before the first and after the last event to the present. Accounting for these open intervals is critical when there are a small number of observed events. The optimal occurrence model is selected according to both the Akaike Information Criteria (AIC) and Akaike's Bayesian Information Criterion (ABIC). In addition, the likelihood ratio test can be performed on occurrence models from the same family: e.g., the gamma model relative to the exponential model of return time distribution. Parameter estimation, model selection, and hypothesis testing are performed on data from two IODP holes in the northern Gulf of Mexico that penetrated a total of 14 MTDs, some of which are correlated between the two holes. Each of these events has been assigned an age based on microfossil zonations and magnetostratigraphic datums. Results from these sites indicate that the Poisson assumption is likely valid. However, parameter estimation results using the likelihood method for one of the sites suggest that the events may have occurred quasi-periodically. Methods developed in this study provide tools with which one can determine both the rate of occurrence and the statistical validity of the Poisson assumption when submarine landslides are included in PTHA.

  15. Supersymmetric leptogenesis and light hidden sectors

    CERN Document Server

    Weniger, Christoph

    2010-01-01

    Thermal leptogenesis and supergravity are attractive scenarios for physics beyond the standard model. However, it is well known that the super-weak interaction of the gravitino often leads to problems with primordial nucleosynthesis in the standard scenario of matter parity conserving MSSM + three right-handed neutrinos. We will present and compare two related solutions to these problems: 1) The conflict between BBN and leptogenesis can be avoided in presence of a hidden sector with light supersymmetric particles which open new decay channels for the dangerous long-lived particles. 2) If there is a condensate in the hidden sector, such additional decay channels can be alternatively opened by dynamical breaking of matter parity in the hidden sector.

  16. Post-traumatic stress and world assumptions: the effects of religious coping.

    Science.gov (United States)

    Zukerman, Gil; Korn, Liat

    2014-12-01

    Religiosity has been shown to moderate the negative effects of traumatic event experiences. The current study was designed to examine the relationship between post-traumatic stress (PTS) following traumatic event exposure; world assumptions defined as basic cognitive schemas regarding the world; and self and religious coping conceptualized as drawing on religious beliefs and practices for understanding and dealing with life stressors. This study examined 777 Israeli undergraduate students who completed several questionnaires which sampled individual world assumptions and religious coping in addition to measuring PTS, as manifested by the PTSD check list. Results indicate that positive religious coping was significantly associated with more positive world assumptions, while negative religious coping was significantly associated with more negative world assumptions. Additionally, negative world assumptions were significantly associated with more avoidance symptoms, while reporting higher rates of traumatic event exposure was significantly associated with more hyper-arousal. These findings suggest that religious-related cognitive schemas directly affect world assumptions by creating protective shields that may prevent the negative effects of confronting an extreme negative experience.

  17. Assessing framing assumptions in quantitative health impact assessments: a housing intervention example.

    Science.gov (United States)

    Mesa-Frias, Marco; Chalabi, Zaid; Foss, Anna M

    2013-09-01

    Health impact assessment (HIA) is often used to determine ex ante the health impact of an environmental policy or an environmental intervention. Underpinning any HIA is the framing assumption, which defines the causal pathways mapping environmental exposures to health outcomes. The sensitivity of the HIA to the framing assumptions is often ignored. A novel method based on fuzzy cognitive map (FCM) is developed to quantify the framing assumptions in the assessment stage of a HIA, and is then applied to a housing intervention (tightening insulation) as a case-study. Framing assumptions of the case-study were identified through a literature search of Ovid Medline (1948-2011). The FCM approach was used to identify the key variables that have the most influence in a HIA. Changes in air-tightness, ventilation, indoor air quality and mould/humidity have been identified as having the most influence on health. The FCM approach is widely applicable and can be used to inform the formulation of the framing assumptions in any quantitative HIA of environmental interventions. We argue that it is necessary to explore and quantify framing assumptions prior to conducting a detailed quantitative HIA during the assessment stage.

  18. Hidden Markov models estimation and control

    CERN Document Server

    Elliott, Robert J; Moore, John B

    1995-01-01

    As more applications are found, interest in Hidden Markov Models continues to grow. Following comments and feedback from colleagues, students and other working with Hidden Markov Models the corrected 3rd printing of this volume contains clarifications, improvements and some new material, including results on smoothing for linear Gaussian dynamics. In Chapter 2 the derivation of the basic filters related to the Markov chain are each presented explicitly, rather than as special cases of one general filter. Furthermore, equations for smoothed estimates are given. The dynamics for the Kalman filte

  19. Hidden simplicity of gauge theory amplitudes

    Energy Technology Data Exchange (ETDEWEB)

    Drummond, J M, E-mail: drummond@lapp.in2p3.f [LAPTH, Universite de Savoie, CNRS, B.P. 110, F-74941 Annecy-le-Vieux, Cedex (France)

    2010-11-07

    These notes were given as lectures at the CERN Winter School on Supergravity, Strings and Gauge Theory 2010. We describe the structure of scattering amplitudes in gauge theories, focussing on the maximally supersymmetric theory to highlight the hidden symmetries which appear. Using the Britto, Cachzo, Feng and Witten (BCFW) recursion relations we solve the tree-level S-matrix in N=4 super Yang-Mills theory and describe how it produces a sum of invariants of a large symmetry algebra. We review amplitudes in the planar theory beyond tree level, describing the connection between amplitudes and Wilson loops, and discuss the implications of the hidden symmetries.

  20. Hidden simplicity of gauge theory amplitudes

    Science.gov (United States)

    Drummond, J. M.

    2010-11-01

    These notes were given as lectures at the CERN Winter School on Supergravity, Strings and Gauge Theory 2010. We describe the structure of scattering amplitudes in gauge theories, focussing on the maximally supersymmetric theory to highlight the hidden symmetries which appear. Using the Britto, Cachzo, Feng and Witten (BCFW) recursion relations we solve the tree-level S-matrix in \\ {N}=4 super Yang-Mills theory and describe how it produces a sum of invariants of a large symmetry algebra. We review amplitudes in the planar theory beyond tree level, describing the connection between amplitudes and Wilson loops, and discuss the implications of the hidden symmetries.

  1. Hidden neural networks: application to speech recognition

    DEFF Research Database (Denmark)

    Riis, Søren Kamaric

    1998-01-01

    We evaluate the hidden neural network HMM/NN hybrid on two speech recognition benchmark tasks; (1) task independent isolated word recognition on the Phonebook database, and (2) recognition of broad phoneme classes in continuous speech from the TIMIT database. It is shown how hidden neural networks...... (HNNs) with much fewer parameters than conventional HMMs and other hybrids can obtain comparable performance, and for the broad class task it is illustrated how the HNN can be applied as a purely transition based system, where acoustic context dependent transition probabilities are estimated by neural...

  2. Dark Radiation from a hidden U(1)

    CERN Document Server

    Vogel, Hendrik

    2015-01-01

    We discuss the impact of a hidden sector consisting of Minicharged Particles (MCPs) and massless hidden photons on the expansion history of our Universe. We present parameter scans for the amount of extra relativistic particles (Neff) and the abundance of light nuclei for fermionic MCPs with masses between ~100 keV and 10 GeV and minicharges in the range 10^(-11)-1. Current CMB and BBN data significantly constrain the available parameter space of MCPs. The shown results are a valuable indicator for future experimental searches and are presented in a flexible way so that more accurate results on Neff can be easily interpreted.

  3. Hidden Symmetries, Central Charges and All That

    CERN Document Server

    de Wit, Bernard; Wit, Bernard de; Nicolai, Hermann

    2001-01-01

    In this review we discuss hidden symmetries of toroidal compactifications of eleven-dimensional supergravity. We recall alternative versions of this theory which exhibit traces of the hidden symmetries when still retaining the massive Kaluza-Klein states. We reconsider them in the broader perspective of M-theory which incorporates a more extended variety of BPS states. We also argue for a new geometry that may underly these theories. All our arguments point towards an extension of the number of space-time coordinates beyond eleven.

  4. Hidden Subgroup States are Almost Orthogonal

    CERN Document Server

    Ettinger, M; Knill, E H; Ettinger, Mark; Hoyer, Peter; Knill, Emanuel

    1999-01-01

    It is well known that quantum computers can efficiently find a hidden subgroup $H$ of a finite Abelian group $G$. This implies that after only a polynomial (in $\\log |G|$) number of calls to the oracle function, the states corresponding to different candidate subgroups have exponentially small inner product. We show that this is true for noncommutative groups also. We present a quantum algorithm which identifies a hidden subgroup of an arbitrary finite group $G$ in only a linear (in $\\log |G|$) number of calls to the oracle function. This is exponentially better than the best classical algorithm. However our quantum algorithm requires an exponential amount of time, as in the classical case.

  5. Searching for hidden sectors in multiparticle production at the LHC

    CERN Document Server

    Sanchis-Lozano, Miguel-Angel; Moreno-Picot, Salvador

    2015-01-01

    We study the impact of a hidden sector beyond the Standard Model, e.g. a Hidden Valley model, on factorial moments and cumulants of multiplicity distributions in multiparticle production with a special emphasis on the prospects for LHC results.

  6. Entropy Rate for Hidden Markov Chains with rare transitions

    OpenAIRE

    2010-01-01

    We consider Hidden Markov Chains obtained by passing a Markov Chain with rare transitions through a noisy memoryless channel. We obtain asymptotic estimates for the entropy of the resulting Hidden Markov Chain as the transition rate is reduced to zero.

  7. The Corporate Illiterates: The Hidden Illiterates of Silicon Valley.

    Science.gov (United States)

    Chase, Sharon

    1991-01-01

    Describes the writing and business communication problems of college-educated workers in Silicon Valley. Discusses hidden illiterates in the universities and in the workplace. Offers solutions for professors and managers faced with the problem of hidden illiterates. (PRA)

  8. A criterion of orthogonality on the assumption and restrictions in subgrid-scale modelling of turbulence

    Science.gov (United States)

    Fang, L.; Sun, X. Y.; Liu, Y. W.

    2016-12-01

    In order to shed light on understanding the subgrid-scale (SGS) modelling methodology, we analyze and define the concepts of assumption and restriction in the modelling procedure, then show by a generalized derivation that if there are multiple stationary restrictions in a modelling, the corresponding assumption function must satisfy a criterion of orthogonality. Numerical tests using one-dimensional nonlinear advection equation are performed to validate this criterion. This study is expected to inspire future research on generally guiding the SGS modelling methodology.

  9. Design and Implementation of Domain based Semantic Hidden Web Crawler

    OpenAIRE

    Manvi; Bhatia, Komal Kumar; Dixit, Ashutosh

    2015-01-01

    Web is a wide term which mainly consists of surface web and hidden web. One can easily access the surface web using traditional web crawlers, but they are not able to crawl the hidden portion of the web. These traditional crawlers retrieve contents from web pages, which are linked by hyperlinks ignoring the information hidden behind form pages, which cannot be extracted using simple hyperlink structure. Thus, they ignore large amount of data hidden behind search forms. This paper emphasizes o...

  10. IEEE 802.11e (EDCA analysis in the presence of hidden stations

    Directory of Open Access Journals (Sweden)

    Xijie Liu

    2011-07-01

    Full Text Available The key contribution of this paper is the combined analytical analysis of both saturated and non-saturated throughput of IEEE 802.11e networks in the presence of hidden stations. This approach is an extension to earlier works by other authors which provided Markov chain analysis to the IEEE 802.11 family under various assumptions. Our approach also modifies earlier expressions for the probability that a station transmits a packet in a vulnerable period. The numerical results provide the impact of the access categories on the channel throughput. Various throughput results under different mechanisms are presented.

  11. Discussion of the classification concept and definition of the hidden accident%事故隐患分级概念与定义商榷

    Institute of Scientific and Technical Information of China (English)

    史宗保; 史聪聪; 冯文刚; 张椿婷

    2015-01-01

    针对安全隐患与事故隐患概念的理解各不同的问题,对安全隐患和事故隐患进行了准确定义。认为在实际的安全生产和安全监管工作中,为实现安全关口前移,实现早防早治,把事故隐患和安全隐患统称为安全隐患是比较合适的。对安全隐患分级提出了更为合理的分级标准。%Aiming at the problem that the concept of the hidden danger and the hidden acci-dent was differently understood,this paper accurately defined the hidden danger and the hidden accident.It was appropriate that the hidden accident and hidden danger were collectively referred to as the hidden danger to achieve safety gate moved forward as well as early prevention and treatment at the work of the actual safety production and safety supervision.The more reasonable classification standard of the hidden danger was proposed.

  12. Variational Hidden Conditional Random Fields with Coupled Dirichlet Process Mixtures

    NARCIS (Netherlands)

    Bousmalis, K.; Zafeiriou, S.; Morency, L.P.; Pantic, Maja; Ghahramani, Z.

    2013-01-01

    Hidden Conditional Random Fields (HCRFs) are discriminative latent variable models which have been shown to successfully learn the hidden structure of a given classification problem. An infinite HCRF is an HCRF with a countably infinite number of hidden states, which rids us not only of the necessit

  13. 26 CFR 1.752-6 - Partnership assumption of partner's section 358(h)(3) liability after October 18, 1999, and...

    Science.gov (United States)

    2010-04-01

    ... general. If, in a transaction described in section 721(a), a partnership assumes a liability (defined in... partnership is the fair market value of that interest increased by the partner's share of partnership...) does not apply to an assumption of a liability (defined in section 358(h)(3)) by a partnership as part...

  14. Testing the habituation assumption underlying models of parasitoid foraging behavior

    Science.gov (United States)

    Abram, Katrina; Colazza, Stefano; Peri, Ezio

    2017-01-01

    Background Habituation, a form of non-associative learning, has several well-defined characteristics that apply to a wide range of physiological and behavioral responses in many organisms. In classic patch time allocation models, habituation is considered to be a major mechanistic component of parasitoid behavioral strategies. However, parasitoid behavioral responses to host cues have not previously been tested for the known, specific characteristics of habituation. Methods In the laboratory, we tested whether the foraging behavior of the egg parasitoid Trissolcus basalis shows specific characteristics of habituation in response to consecutive encounters with patches of host (Nezara viridula) chemical contact cues (footprints), in particular: (i) a training interval-dependent decline in response intensity, and (ii) a training interval-dependent recovery of the response. Results As would be expected of a habituated response, wasps trained at higher frequencies decreased their behavioral response to host footprints more quickly and to a greater degree than those trained at low frequencies, and subsequently showed a more rapid, although partial, recovery of their behavioral response to host footprints. This putative habituation learning could not be blocked by cold anesthesia, ingestion of an ATPase inhibitor, or ingestion of a protein synthesis inhibitor. Discussion Our study provides support for the assumption that diminishing responses of parasitoids to chemical indicators of host presence constitutes habituation as opposed to sensory fatigue, and provides a preliminary basis for exploring the underlying mechanisms. PMID:28321365

  15. Perceptual consequences of "hidden" hearing loss.

    Science.gov (United States)

    Plack, Christopher J; Barker, Daphne; Prendergast, Garreth

    2014-09-09

    Dramatic results from recent animal experiments show that noise exposure can cause a selective loss of high-threshold auditory nerve fibers without affecting absolute sensitivity permanently. This cochlear neuropathy has been described as hidden hearing loss, as it is not thought to be detectable using standard measures of audiometric threshold. It is possible that hidden hearing loss is a common condition in humans and may underlie some of the perceptual deficits experienced by people with clinically normal hearing. There is some evidence that a history of noise exposure is associated with difficulties in speech discrimination and temporal processing, even in the absence of any audiometric loss. There is also evidence that the tinnitus experienced by listeners with clinically normal hearing is associated with cochlear neuropathy, as measured using Wave I of the auditory brainstem response. To date, however, there has been no direct link made between noise exposure, cochlear neuropathy, and perceptual difficulties. Animal experiments also reveal that the aging process itself, in the absence of significant noise exposure, is associated with loss of auditory nerve fibers. Evidence from human temporal bone studies and auditory brainstem response measures suggests that this form of hidden loss is common in humans and may have perceptual consequences, in particular, regarding the coding of the temporal aspects of sounds. Hidden hearing loss is potentially a major health issue, and investigations are ongoing to identify the causes and consequences of this troubling condition.

  16. The structural strength of glass: hidden damage

    NARCIS (Netherlands)

    Veer, F.A.; Rodichev, Y.M.

    2011-01-01

    We discuss “hidden damage” of glass by the rolling process, which results in heterogeneous distribution of microcracks on the edge surface of glass element, which are the fracture source deteriorating glass element strength. It is shown that removal of this damage on the edges of glass elements

  17. Discovering Hidden Treasures with GPS Technology

    Science.gov (United States)

    Nagel, Paul; Palmer, Roger

    2014-01-01

    "I found it!" Addison proudly proclaimed, as she used an iPhone and Global Positioning System (GPS) software to find the hidden geocache along the riverbank. Others in Lisa Bostick's fourth grade class were jealous, but there would be other geocaches to find. With the excitement of movies like "Pirates of the Caribbean" and…

  18. Hidden Markov Models for Human Genes

    DEFF Research Database (Denmark)

    Baldi, Pierre; Brunak, Søren; Chauvin, Yves

    1997-01-01

    We analyse the sequential structure of human genomic DNA by hidden Markov models. We apply models of widely different design: conventional left-right constructs and models with a built-in periodic architecture. The models are trained on segments of DNA sequences extracted such that they cover...

  19. Dermatologic hazards from hidden contacts with penicillin

    Energy Technology Data Exchange (ETDEWEB)

    Boonk, W.J.

    1981-01-01

    The unbridled use of penicillin after its discovery by Fleming has resulted in possible hazards to human health due to traces of the drug being present in food and other hidden sources. These hazards may include toxic effects, hypersensitivity reactions and possibly a raising of the frequency and duration of allergy to penicillin.

  20. The structural strength of glass: hidden damage

    NARCIS (Netherlands)

    Veer, F.A.; Rodichev, Y.M.

    2011-01-01

    We discuss “hidden damage” of glass by the rolling process, which results in heterogeneous distribution of microcracks on the edge surface of glass element, which are the fracture source deteriorating glass element strength. It is shown that removal of this damage on the edges of glass elements incr

  1. Computerized Testing: The Hidden Figures Test.

    Science.gov (United States)

    Jacobs, Ronald L.; And Others

    1985-01-01

    This study adapted the Hidden Figures Test for use on PLATO and determined the reliability of the computerized version compared to the paper and pencil version. Results indicate the test was successfully adapted with some modifications, and it was judged reliable although it may be measuring additional constructs. (MBR)

  2. Towards gauge unified, supersymmetric hidden strong dynamics

    CERN Document Server

    Chiang, Cheng-Wei; Ye, Fang

    2016-01-01

    We consider a class of models with extra complex scalars that are charged under both the Standard Model and a hidden strongly coupled $SU(N)_H$ gauge sector, and discuss the scenarios where the new scalars are identified as the messenger fields that mediate the spontaneously broken supersymmetries from the hidden sector to the visible sector. The new scalars are embedded into 5-plets and 10-plets of an $SU(5)_V$ gauge group that potentially unifies the Standard Model gauge groups. They also form a tower of bound states via hidden strong dynamics around the TeV scale. The Higgs bosons remain as elementary particles. Quadratically divergent contributions to the Higgs mass from the Standard Model fermions are canceled by the new scalar contributions to alleviate the fine-tuning problem. We also discuss a supersymmetrized version of this class of models, consisting of the minimal supersymmetric Standard Model plus extra chiral multiplets where the new scalars reside. Due to the hidden strong force, the new low-en...

  3. Hidden Costs and Challenges of Servitization

    DEFF Research Database (Denmark)

    Yang, Yifan; Slepniov, Dmitrij

    of these labels, the potential benefits of servitization are often overshadowed by costs associated with it. By using the cases of Chinese and Danish manufacturing firms, this study takes a closer look at possible hidden costs of servitization and contributes to our understanding of servitization performance...

  4. Quantum Discord, CHSH Inequality and Hidden Variables -- Critical reassessment of hidden-variables models

    CERN Document Server

    Fujikawa, Kazuo

    2013-01-01

    Hidden-variables models are critically reassessed. It is first examined if the quantum discord is classically described by the hidden-variable model of Bell in the Hilbert space with $d=2$. The criterion of vanishing quantum discord is related to the notion of reduction and, surprisingly, the hidden-variable model in $d=2$, which has been believed to be consistent so far, is in fact inconsistent and excluded by the analysis of conditional measurement and reduction. The description of the full contents of quantum discord by the deterministic hidden-variables models is not possible. We also re-examine CHSH inequality. It is shown that the well-known prediction of CHSH inequality $|B|\\leq 2$ for the CHSH operator $B$ introduced by Cirel'son is not unique. This non-uniqueness arises from the failure of linearity condition in the non-contextual hidden-variables model in $d=4$ used by Bell and CHSH, in agreement with Gleason's theorem which excludes $d=4$ non-contextual hidden-variables models. If one imposes the l...

  5. Post-relativistic gravity a hidden variable theory for general relativity

    CERN Document Server

    Schmelzer, I

    1996-01-01

    Post-relativistic gravity is a hidden variable theory for general relativity. It introduces the pre-relativistic notions absolute space, absolute time, and ether as hidden variables into general relativity. Evolution is defined by the equations of general relativity and the harmonic coordinate condition interpreted as a physical equation. There are minor differences in predictions compared with general relativity (i.e. trivial topology of the universe is predicted). The unobservable absolute time is designed to solve the problem of time in quantization of general relativity. Background space and time define a Newtonian frame for the quantization of the gravitational field. By the way, a lot of other conceptual problems of quantization will be solved (i.e. no constraints, no topological foam, no black hole and bib bang singularities, natural vacuum definition for quantum fields on classical background).

  6. Hidden Symmetries of Stochastic Models

    Directory of Open Access Journals (Sweden)

    Boyka Aneva

    2007-05-01

    Full Text Available In the matrix product states approach to $n$ species diffusion processes the stationary probability distribution is expressed as a matrix product state with respect to a quadratic algebra determined by the dynamics of the process. The quadratic algebra defines a noncommutative space with a $SU_q(n$ quantum group action as its symmetry. Boundary processes amount to the appearance of parameter dependent linear terms in the algebraic relations and lead to a reduction of the $SU_q(n$ symmetry. We argue that the boundary operators of the asymmetric simple exclusion process generate a tridiagonal algebra whose irriducible representations are expressed in terms of the Askey-Wilson polynomials. The Askey-Wilson algebra arises as a symmetry of the boundary problem and allows to solve the model exactly.

  7. Hidden Markov Models Incorporating Fuzzy Measures and Integrals for Protein Sequence Identification and Alignment

    Institute of Scientific and Technical Information of China (English)

    Niranjan P.Bidargaddi; Madlhu Chetty; Joarder Kamruzzaman

    2008-01-01

    Profile hidden Markov models (HMMs) based on classical HMMs have been widely applied for protein sequence identification. The formulation of the forward and backward variables in profile HMMs is made under statistical independence assumption of the probability theory. We propose a fuzzy profile HMM to overcome the limitations of that assumption and to achieve an improved alignment for protein sequences belonging to a given family. The proposed model fuzzifies the forward and backward variables by incorporating Sugeno fuzzy measures and Choquet integrals, thus further extends the generalized HMM. Based on the fuzzified forwardand backward variables, we propose a fuzzy Baum-Welch parameter estimation al-gorithm for profiles. The strong correlations and the sequence preference involved in the protein structures make this fuzzy architecture based model as a suitable candidate for building profiles of a given family, since the fuzzy set can handle uncertainties better than classical methods.

  8. Experience of Using a Multi-Cathode Counter (MCC) in a Search for Hidden Photon CDM

    CERN Document Server

    Kopylov, A V; Petukhov, V V

    2015-01-01

    We report on a new technique of a Multi-Cathode Counter (MCC) developed to search for hidden photon (HP) cold dark matter (CDM) with a mass from 5 to 500 eV. The method suggested in the assumption that hidden photons of the mass greater than a work function of the metal, the cathode of the counter is fabricated induce emission of single electrons from a cathode. Three configurations of the same counter are used to measure the count rates R1, R2 and R3 of the single electron events during several weeks. As a measure of the effect from HP the difference R1-(R2-D3/D2xR3) has been used. Some preliminary results have been obtained on a first try to search for HP with a mass from 5 to 500 eV. The upper limit for mixing parameter X has been set on the level of 3.3x10-10 for hidden photon mass from 9 to 100 eV. In our plans is to refine the procedure of data treatment and to continue the measurements to collect more data.

  9. Ladar System Identifies Obstacles Partly Hidden by Grass

    Science.gov (United States)

    Castano, Andres

    2003-01-01

    A ladar-based system now undergoing development is intended to enable an autonomous mobile robot in an outdoor environment to avoid moving toward trees, large rocks, and other obstacles that are partly hidden by tall grass. The design of the system incorporates the assumption that the robot is capable of moving through grass and provides for discrimination between grass and obstacles on the basis of geometric properties extracted from ladar readings as described below. The system (see figure) includes a ladar system that projects a range-measuring pulsed laser beam that has a small angular width of radians and is capable of measuring distances of reflective objects from a minimum of dmin to a maximum of dmax. The system is equipped with a rotating mirror that scans the beam through a relatively wide angular range of in a horizontal plane at a suitable small height above the ground. Successive scans are performed at time intervals of seconds. During each scan, the laser beam is fired at relatively small angular intervals of radians to make range measurements, so that the total number of range measurements acquired in a scan is Ne = / .

  10. Umfang und Struktur der Stillen Reserve in den neuen Bundesländern (Size and structure of the hidden labour force in the new federal Länder)

    OpenAIRE

    Fuchs, Johann

    1998-01-01

    "Following the economic collapse in eastern Germany, in addition to the high level of unemployment, a hidden labour force of a considerable size has also developed in the new Länder. The IAB estimates the hidden labour force in the new Länder for 1997 to be more than 800,000 people. This estimation, however, is based in part on plausible assumptions for the development of labour force participation. This is because for methodical reasons the concept of the IAB labour force potential can not y...

  11. Exposing Trust Assumptions in Distributed Policy Enforcement (Briefing Charts)

    Science.gov (United States)

    2016-06-21

    Coordinated defenses appear to be feasible • Writing policies from scratch is hard – Exposing assumptions requires people to think about what assumptions... critical capabilities as: – Adaptation to dynamic service availability – Complex situational dynamics (e.g., differentiating between bot-net and

  12. Co-Dependency: An Examination of Underlying Assumptions.

    Science.gov (United States)

    Myer, Rick A.; And Others

    1991-01-01

    Discusses need for careful examination of codependency as diagnostic category. Critically examines assumptions that codependency is disease, addiction, or predetermined by the environment. Discusses implications of assumptions. Offers recommendations for mental health counselors focusing on need for systematic research, redirection of efforts to…

  13. Co-Dependency: An Examination of Underlying Assumptions.

    Science.gov (United States)

    Myer, Rick A.; And Others

    1991-01-01

    Discusses need for careful examination of codependency as diagnostic category. Critically examines assumptions that codependency is disease, addiction, or predetermined by the environment. Discusses implications of assumptions. Offers recommendations for mental health counselors focusing on need for systematic research, redirection of efforts to…

  14. 29 CFR 4231.10 - Actuarial calculations and assumptions.

    Science.gov (United States)

    2010-07-01

    ... MULTIEMPLOYER PLANS § 4231.10 Actuarial calculations and assumptions. (a) Most recent valuation. All calculations required by this part must be based on the most recent actuarial valuation as of the date of... this part must be based on methods and assumptions that are reasonable in the aggregate, based on...

  15. Special Theory of Relativity without special assumptions and tachyonic motion

    Directory of Open Access Journals (Sweden)

    E. Kapuścik

    2010-01-01

    Full Text Available The most general form of transformations of space-time coordinates in Special Theory of Relativity based solely on physical assumptions is described. Only the linearity of space-time transformations and the constancy of the speed of light are used as assumptions. The application to tachyonic motion is indicated.

  16. 40 CFR 761.2 - PCB concentration assumptions for use.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 30 2010-07-01 2010-07-01 false PCB concentration assumptions for use..., AND USE PROHIBITIONS General § 761.2 PCB concentration assumptions for use. (a)(1) Any person may..., oil-filled cable, and rectifiers whose PCB concentration is not established contain PCBs at < 50 ppm...

  17. Single-hidden-layer feed-forward quantum neural network based on Grover learning.

    Science.gov (United States)

    Liu, Cheng-Yi; Chen, Chein; Chang, Ching-Ter; Shih, Lun-Min

    2013-09-01

    In this paper, a novel single-hidden-layer feed-forward quantum neural network model is proposed based on some concepts and principles in the quantum theory. By combining the quantum mechanism with the feed-forward neural network, we defined quantum hidden neurons and connected quantum weights, and used them as the fundamental information processing unit in a single-hidden-layer feed-forward neural network. The quantum neurons make a wide range of nonlinear functions serve as the activation functions in the hidden layer of the network, and the Grover searching algorithm outstands the optimal parameter setting iteratively and thus makes very efficient neural network learning possible. The quantum neuron and weights, along with a Grover searching algorithm based learning, result in a novel and efficient neural network characteristic of reduced network, high efficient training and prospect application in future. Some simulations are taken to investigate the performance of the proposed quantum network and the result show that it can achieve accurate learning.

  18. Hidden penis release: adjunctive suprapubic lipectomy.

    Science.gov (United States)

    Horton, C E; Vorstman, B; Teasley, D; Winslow, B

    1987-08-01

    We believe the hidden penis may be caused and concealed by a prominent suprapubic fat pad in addition to the restrictive fibrous bands of the dartos fascia fixing the shaft of the penis proximally while loose skin folds prolapse distally over the phallus. A penis of inadequate length or appearance may affect body image. Patients with this problem often require psychological support. Hidden penis may be distinguished from micropenis by palpating adequate corpora and showing a stretched penile length within 2 SD of normal. Excision of suprapubic fat with sectioning of the tethering dartos bands will release and increase the length of the penis. Suprapubic fat pad resection may also be helpful to elongate a short penis in cases of adult microphallus, or after partial penectomy because of trauma or cancer. Circumcision is contraindicated.

  19. Laser experiments explore the hidden sector

    CERN Document Server

    Ahlers, M; Jaeckel, J; Redondo, J; Ringwald, A

    2007-01-01

    Recently, the laser experiments BMV and GammeV, searching for light shining through walls, have published data and calculated new limits on the allowed masses and couplings for axion-like particles. In this note we point out that these experiments can serve to constrain a much wider variety of hidden-sector particles such as, e.g., minicharged particles and hidden-sector photons. The new experiments improve the existing bounds from the older BFRT experiment by a factor of two. Moreover, we use the new PVLAS constraints on a possible rotation and ellipticity of light after it has passed through a strong magnetic field to constrain pure minicharged particle models. For masses <~0.05 eV, the charge is now restricted to be less than (3-4)x10^(-7) times the electron electric charge. This is the best laboratory bound and comparable to bounds inferred from the energy spectrum of the cosmic microwave background.

  20. Extended abstract of a hidden agenda

    Energy Technology Data Exchange (ETDEWEB)

    Goguen, J.; Malcolm, G. [Oxford Univ. (United Kingdom)

    1996-12-31

    The initial goal of our hidden research programme was both straightforward and ambitious: give a semantics for software engineering, and in particular for the object paradigm, supporting correctness proofs that are as simple and mechanical as possible. This emphasizes proofs rather than models, and thus suggests an equational approach, rather than one based on higher order logic, denotational semantics, or any kind of model, because equational proofs achieve maximal simplicity and mechanization, and yet are fully expressive. We introduce powerful coinduction techniques for proving behavioral properties of complex systems. We make the no doubt outrageous claim that our hidden approach gives simpler proofs than other formalisms; this is because we exploit algebraic structure that most other approaches discard.

  1. Hidden geometric correlations in real multiplex networks

    Science.gov (United States)

    Kleineberg, Kaj-Kolja; Boguñá, Marián; Ángeles Serrano, M.; Papadopoulos, Fragkiskos

    2016-11-01

    Real networks often form interacting parts of larger and more complex systems. Examples can be found in different domains, ranging from the Internet to structural and functional brain networks. Here, we show that these multiplex systems are not random combinations of single network layers. Instead, they are organized in specific ways dictated by hidden geometric correlations between the layers. We find that these correlations are significant in different real multiplexes, and form a key framework for answering many important questions. Specifically, we show that these geometric correlations facilitate the definition and detection of multidimensional communities, which are sets of nodes that are simultaneously similar in multiple layers. They also enable accurate trans-layer link prediction, meaning that connections in one layer can be predicted by observing the hidden geometric space of another layer. And they allow efficient targeted navigation in the multilayer system using only local knowledge, outperforming navigation in the single layers only if the geometric correlations are sufficiently strong.

  2. Hidden Markov induced Dynamic Bayesian Network for recovering time evolving gene regulatory networks

    Science.gov (United States)

    Zhu, Shijia; Wang, Yadong

    2015-12-01

    Dynamic Bayesian Networks (DBN) have been widely used to recover gene regulatory relationships from time-series data in computational systems biology. Its standard assumption is ‘stationarity’, and therefore, several research efforts have been recently proposed to relax this restriction. However, those methods suffer from three challenges: long running time, low accuracy and reliance on parameter settings. To address these problems, we propose a novel non-stationary DBN model by extending each hidden node of Hidden Markov Model into a DBN (called HMDBN), which properly handles the underlying time-evolving networks. Correspondingly, an improved structural EM algorithm is proposed to learn the HMDBN. It dramatically reduces searching space, thereby substantially improving computational efficiency. Additionally, we derived a novel generalized Bayesian Information Criterion under the non-stationary assumption (called BWBIC), which can help significantly improve the reconstruction accuracy and largely reduce over-fitting. Moreover, the re-estimation formulas for all parameters of our model are derived, enabling us to avoid reliance on parameter settings. Compared to the state-of-the-art methods, the experimental evaluation of our proposed method on both synthetic and real biological data demonstrates more stably high prediction accuracy and significantly improved computation efficiency, even with no prior knowledge and parameter settings.

  3. Hidden Markov induced Dynamic Bayesian Network for recovering time evolving gene regulatory networks.

    Science.gov (United States)

    Zhu, Shijia; Wang, Yadong

    2015-12-18

    Dynamic Bayesian Networks (DBN) have been widely used to recover gene regulatory relationships from time-series data in computational systems biology. Its standard assumption is 'stationarity', and therefore, several research efforts have been recently proposed to relax this restriction. However, those methods suffer from three challenges: long running time, low accuracy and reliance on parameter settings. To address these problems, we propose a novel non-stationary DBN model by extending each hidden node of Hidden Markov Model into a DBN (called HMDBN), which properly handles the underlying time-evolving networks. Correspondingly, an improved structural EM algorithm is proposed to learn the HMDBN. It dramatically reduces searching space, thereby substantially improving computational efficiency. Additionally, we derived a novel generalized Bayesian Information Criterion under the non-stationary assumption (called BWBIC), which can help significantly improve the reconstruction accuracy and largely reduce over-fitting. Moreover, the re-estimation formulas for all parameters of our model are derived, enabling us to avoid reliance on parameter settings. Compared to the state-of-the-art methods, the experimental evaluation of our proposed method on both synthetic and real biological data demonstrates more stably high prediction accuracy and significantly improved computation efficiency, even with no prior knowledge and parameter settings.

  4. The Hidden Gifts of Quiet Kids

    Science.gov (United States)

    Trierweiler, Hannah

    2006-01-01

    The author relates that she was an introvert child. It has always taken her time and energy to find her place in a group. As a grown-up, she still needed quiet time to regroup during a busy day. In this article, the author presents an interview with Marti Olsen Laney, author of "The Hidden Gifts of the Introverted Child." During the interview,…

  5. Finite State Transducers Approximating Hidden Markov Models

    CERN Document Server

    Kempe, A

    1999-01-01

    This paper describes the conversion of a Hidden Markov Model into a sequential transducer that closely approximates the behavior of the stochastic model. This transformation is especially advantageous for part-of-speech tagging because the resulting transducer can be composed with other transducers that encode correction rules for the most frequent tagging errors. The speed of tagging is also improved. The described methods have been implemented and successfully tested on six languages.

  6. Hidden symmetries in dilaton-axion gravity

    CERN Document Server

    Kechkin, O V

    1996-01-01

    Four--dimensional Einstein--Maxwell--dilaton--axion system restricted to space--times with one non--null Killing symmetry is formulated as the three--dimensional gravity coupled sigma--model. Several alternative representations are discussed and the associated hidden symmetries are revealed. The action of target space isometries on the initial set of (non--dualized ) variables is found. New mulicenter solutions are obtained via generating technique based on the formulation in terms of the non--dualized variables.

  7. Caldera rim collapse: A hidden volcanic hazard

    OpenAIRE

    Merle, Olivier; Michon, Laurent; Bachèlery, Patrick

    2008-01-01

    International audience; Following the emblematic flank collapse of Mount St Helens in 1981, numerous models of flank sliding have been proposed. These models have allowed to largely improve the understanding of mechanisms involved in such landslides, which represent a tremendous risk for populations living around volcanoes. In this article, a new mode of landslide formation, related to buried calderas, is described. The model emphasizes the paramount importance of the hidden ring fault that, ...

  8. Online Learning in Discrete Hidden Markov Models

    OpenAIRE

    Alamino, Roberto C.; Caticha, Nestor

    2007-01-01

    We present and analyse three online algorithms for learning in discrete Hidden Markov Models (HMMs) and compare them with the Baldi-Chauvin Algorithm. Using the Kullback-Leibler divergence as a measure of generalisation error we draw learning curves in simplified situations. The performance for learning drifting concepts of one of the presented algorithms is analysed and compared with the Baldi-Chauvin algorithm in the same situations. A brief discussion about learning and symmetry breaking b...

  9. Definable deduction relation

    Institute of Scientific and Technical Information of China (English)

    张玉平

    1999-01-01

    The nonmonotonic deduction relation in default reasoning is defined with fixed point style, which has the many-extension property that classical logic is not possessed of. These two kinds of deductions both have boolean definability property, that is, their extensions or deductive closures can be defined by boolean formulas. A generalized form of fixed point method is employed to define a class of deduction relations, which all have the above property. Theorems on definability and atomless boolean algebras in model theory are essential in dealing with this assertion.

  10. Lepton mixing from the hidden sector

    Science.gov (United States)

    Ludl, P. O.; Smirnov, A. Yu.

    2015-10-01

    Experimental results indicate a possible relation between the lepton and quark mixing matrices of the form UPMNS≈VCKM†UX , where UX is a matrix with special structure related to the mechanism of neutrino mass generation. We propose a framework which can realize such a relation. The main ingredients of the framework are the double seesaw mechanism, SO(10) grand unification and a hidden sector of theory. The latter is composed of singlets (fermions and bosons) of the grand unified theory (GUT) symmetry with masses between the GUT and Planck scale. The interactions in this sector obey certain symmetries Ghidden. We explore the conditions under which symmetries Ghidden can produce flavor structures in the visible sector. Here the key elements are the basis-fixing symmetry and mediators which communicate information about properties of the hidden sector to the visible one. The interplay of SO(10) symmetry, basis-fixing symmetry identified as Z2×Z2 and Ghidden can lead to the required form of UX. A different kind of new physics is responsible for generation of the CKM mixing. We present the simplest realizations of the framework which differ by nature of the mediators and by symmetries of the hidden sector.

  11. Otoendoscopic treatment of hidden lesions in otomastoiditis

    Institute of Scientific and Technical Information of China (English)

    LIU Yang; SUN Jian-jun; LIN Yong-sheng; ZHAO Dan-heng; ZHAO Jing; LEI Fei

    2010-01-01

    Background Surgical treatments for chronic suppurative and cholesteatoma otitis media have been discussed for several decades, but recurrences still occur because of the complex dissection required and hidden lesions associated with otomastoiditis. This study investigated the technology and strategy behind the use of otoendoscopic-assisted otosurgery.Methods We reported on hidden lesions in 32 ears of patients with otomastoiditis between November 2006 and January 2009. All the patients were treated with the aid of an otoendoscope. The advantages of otoendoscopy, including multi-angle light scattering, aperture illumination, and magnification of the local operative field, were utilized in otologic microsurgery, and otoendoscopic operative techniques were introduced for operative sites such as the epitympanum, aditus of the antrum, facial recess, sinus tympani and the mastoid tip.Results All patients were followed up from 3 months to 2 years after surgery. All patients recovered well within 3 months following surgery, except for one case of epithelialization of the mastoid cavity occurring 6 months after surgery for cholesteatoma on the cerebellar surface and another case with Bezold's abscess, hyperplastic granulation tissue developed at the antrum.Conclusions Otoendoscopy can overcome the technical deficiency of rectilinearity of the visual axis associated with otomicroscopic illumination, which presents a problem when dealing with otomastoiditis lesions in hidden areas. This technique allows such lesions within the complex three-dimensional structure to be visualized and cleaned. Otoendoscopy thus has significant potential for improving the quality of surgery and reducing the risk of postoperative recurrence.

  12. Dark matter in the hidden gauge theory

    CERN Document Server

    Yamanaka, Nodoka; Gongyo, Shinya; Iida, Hideaki

    2014-01-01

    The cosmological scenario of the dark matter generated in the hidden gauge theory based on the grand unification is discussed. It is found that the stability of the dark matter halo of our Galaxy and the cosmic ray observation constrain, respectively, the dark matter mass and the unification scale between the standard model and the hidden gauge theory sectors. To obtain a phenomenologically consistent thermal evolution, the entropy of the standard model sector needs to be increased. We therefore propose a scenario where the mini-inflation is induced from the potential coupled to the Standard model sector, in particular the Higgs sector. This scenario makes consistent the current dark matter density as well as the baryon-to-photon ratio for the case of pion dark matter. For the glueball or heavy pion of hidden gauge theory, an additional mini-inflation in the standard model sector before the leptogenesis is required. We also propose the possibility to confirm this scenario by known prospective experimental app...

  13. The Hidden World within Plants: Ecological and Evolutionary Considerations for Defining Functioning of Microbial Endophytes.

    Science.gov (United States)

    Hardoim, Pablo R; van Overbeek, Leonard S; Berg, Gabriele; Pirttilä, Anna Maria; Compant, Stéphane; Campisano, Andrea; Döring, Matthias; Sessitsch, Angela

    2015-09-01

    All plants are inhabited internally by diverse microbial communities comprising bacterial, archaeal, fungal, and protistic taxa. These microorganisms showing endophytic lifestyles play crucial roles in plant development, growth, fitness, and diversification. The increasing awareness of and information on endophytes provide insight into the complexity of the plant microbiome. The nature of plant-endophyte interactions ranges from mutualism to pathogenicity. This depends on a set of abiotic and biotic factors, including the genotypes of plants and microbes, environmental conditions, and the dynamic network of interactions within the plant biome. In this review, we address the concept of endophytism, considering the latest insights into evolution, plant ecosystem functioning, and multipartite interactions.

  14. The Hidden World within Plants: Ecological and Evolutionary Considerations for Defining Functioning of Microbial Endophytes

    Science.gov (United States)

    van Overbeek, Leonard S.; Berg, Gabriele; Pirttilä, Anna Maria; Compant, Stéphane; Campisano, Andrea; Döring, Matthias; Sessitsch, Angela

    2015-01-01

    SUMMARY All plants are inhabited internally by diverse microbial communities comprising bacterial, archaeal, fungal, and protistic taxa. These microorganisms showing endophytic lifestyles play crucial roles in plant development, growth, fitness, and diversification. The increasing awareness of and information on endophytes provide insight into the complexity of the plant microbiome. The nature of plant-endophyte interactions ranges from mutualism to pathogenicity. This depends on a set of abiotic and biotic factors, including the genotypes of plants and microbes, environmental conditions, and the dynamic network of interactions within the plant biome. In this review, we address the concept of endophytism, considering the latest insights into evolution, plant ecosystem functioning, and multipartite interactions. PMID:26136581

  15. MONITORED GEOLOGIC REPOSITORY LIFE CYCLE COST ESTIMATE ASSUMPTIONS DOCUMENT

    Energy Technology Data Exchange (ETDEWEB)

    R.E. Sweeney

    2001-02-08

    The purpose of this assumptions document is to provide general scope, strategy, technical basis, schedule and cost assumptions for the Monitored Geologic Repository (MGR) life cycle cost (LCC) estimate and schedule update incorporating information from the Viability Assessment (VA) , License Application Design Selection (LADS), 1999 Update to the Total System Life Cycle Cost (TSLCC) estimate and from other related and updated information. This document is intended to generally follow the assumptions outlined in the previous MGR cost estimates and as further prescribed by DOE guidance.

  16. Hidden laser communications through matter. An application of meV-scale hidden photons

    Energy Technology Data Exchange (ETDEWEB)

    Jaeckel, Joerg [Durham Univ. (United Kingdom). Inst. for Particle Physics and Phenomenology; Redondo, Javier; Ringwald, Andreas [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany)

    2009-04-15

    Currently, there are a number of light-shining-through-walls experiments searching for hidden photons - light, sub-eV-scale, abelian gauge bosons beyond the standard model which mix kinetically with the standard photon. We show that in the case that one of these experiments finds evidence for hidden photons, laser communications through matter, using methods from free-space optics, can be realized in the very near future, with a channel capacity of more than 1 bit per second, for a distance up to the Earth's diameter. (orig.)

  17. Historically defined autobiographical periods

    DEFF Research Database (Denmark)

    Brown, Norman R.; Hansen, Tia G. B.; Lee, Peter J.;

    2012-01-01

    The chapter reviews a research programme that has demonstrated the existence of historically defined autobiographical periods and identified the conditions that bring them about. Data from four samples of World War II-generation adults show that historically defined autobiographical periods endure...... over time and theoretical implications are discussed, notably by introducing a new approach to autobiographical memory, Transition Theory, which assumes that autobiographical memory is organized by transitional events that can be selfinitiated or externally imposed - historically defined...

  18. Can Total Quality Management Succeed at Your College--Now? (Does Your College Meet the Essential Prerequisites and Underlying Assumptions of TQM?)

    Science.gov (United States)

    Hammons, James O.

    1994-01-01

    Defines Total Quality Management (TQM) and describes prerequisites for successful implementation, underlying assumptions, and the cultural barriers hindering implementation. Indicates that TQM's long-term benefits outweigh costs at most colleges. Urges practitioners to rate their schools with respect to the prerequisites and assumptions to…

  19. Can Total Quality Management Succeed at Your College--Now? (Does Your College Meet the Essential Prerequisites and Underlying Assumptions of TQM?)

    Science.gov (United States)

    Hammons, James O.

    1994-01-01

    Defines Total Quality Management (TQM) and describes prerequisites for successful implementation, underlying assumptions, and the cultural barriers hindering implementation. Indicates that TQM's long-term benefits outweigh costs at most colleges. Urges practitioners to rate their schools with respect to the prerequisites and assumptions to…

  20. Microwave background constraints on mixing of photons with hidden photons

    Energy Technology Data Exchange (ETDEWEB)

    Mirizzi, Alessandro [Max-Planck-Institut fuer Physik, Muenchen (Germany); Redondo, Javier [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Sigl, Guenter [Hamburg Univ. (Germany). 2. Inst. fuer Theoretische Physik

    2008-12-15

    Various extensions of the Standard Model predict the existence of hidden photons kinetically mixing with the ordinary photon. This mixing leads to oscillations between photons and hidden photons, analogous to the observed oscillations between different neutrino flavors. In this context, we derive new bounds on the photon-hidden photon mixing parameters using the high precision cosmic microwave background spectral data collected by the Far Infrared Absolute Spectrophotometer instrument on board of the Cosmic Background Explorer. Requiring the distortions of the CMB induced by the photon-hidden photon mixing to be smaller than experimental upper limits, this leads to a bound on the mixing angle {chi}{sub 0} hidden photon masses between 10{sup -14} eV and 10{sup -7} eV. This low-mass and low-mixing region of the hidden photon parameter space was previously unconstrained. (orig.)

  1. Supporting calculations and assumptions for use in WESF safetyanalysis

    Energy Technology Data Exchange (ETDEWEB)

    Hey, B.E.

    1997-03-07

    This document provides a single location for calculations and assumptions used in support of Waste Encapsulation and Storage Facility (WESF) safety analyses. It also provides the technical details and bases necessary to justify the contained results.

  2. Discourses and Theoretical Assumptions in IT Project Portfolio Management

    DEFF Research Database (Denmark)

    Hansen, Lars Kristian; Kræmmergaard, Pernille

    2014-01-01

    DISCOURSES AND THEORETICAL ASSUMPTIONS IN IT PROJECT PORTFOLIO MANAGEMENT: A REVIEW OF THE LITERATURE These years increasing interest is put on IT project portfolio management (IT PPM). Considering IT PPM an interdisciplinary practice, we conduct a concept-based literature review of relevant...... to articulate and discuss underlying and conflicting assumptions in IT PPM, serving as a basis for adjusting organizations’ IT PPM practices. Keywords: IT project portfolio management or IT PPM, literature review, scientific discourses, underlying assumptions, unintended consequences, epistemological biases...... literature, and few contributions represent the three remaining discourses, which unjustifiably leaves out issues that research could and most probably should investigate. In order to highlight research potentials, limitations, and underlying assumptions of each discourse, we develop four IT PPM metaphors...

  3. Different Random Distributions Research on Logistic-Based Sample Assumption

    Directory of Open Access Journals (Sweden)

    Jing Pan

    2014-01-01

    Full Text Available Logistic-based sample assumption is proposed in this paper, with a research on different random distributions through this system. It provides an assumption system of logistic-based sample, including its sample space structure. Moreover, the influence of different random distributions for inputs has been studied through this logistic-based sample assumption system. In this paper, three different random distributions (normal distribution, uniform distribution, and beta distribution are used for test. The experimental simulations illustrate the relationship between inputs and outputs under different random distributions. Thereafter, numerical analysis infers that the distribution of outputs depends on that of inputs to some extent, and this assumption system is not independent increment process, but it is quasistationary.

  4. Distributed automata in an assumption-commitment framework

    Indian Academy of Sciences (India)

    Swarup Mohalik; R Ramanujam

    2002-04-01

    We propose a class of finite state systems of synchronizing distributed processes, where processes make assumptions at local states about the state of other processes in the system. This constrains the global states of the system to those where assumptions made by a process about another are compatible with the commitments offered by the other at that state. We model examples like reliable bit transmission and sequence transmission protocols in this framework and discuss how assumption-commitment structure facilitates compositional design of such protocols. We prove a decomposition theorem which states that every protocol specified globally as a finite state system can be decomposed into such an assumption compatible system. We also present a syntactic characterization of this class using top level parallel composition.

  5. Search for Hidden Knowledge in Collective Intelligence dealing Indeterminacy Ontology of Folksonomy with Linguistic Pragmatics and Quantum Logic

    CERN Document Server

    Mas, Massimiliano Dal

    2011-01-01

    Information retrieval is not only the most frequent application executed on the Web but it is also the base of different types of applications. Considering collective intelligence of groups of individuals as a framework for evaluating and incorporating new experiences and information we often cannot retrieve such knowledge being tacit. Tacit knowledge underlies many competitive capabilities and it is hard to articulate on discrete ontology structure. It is unstructured or unorganized, and therefore remains hidden. Developing generic solutions that can find the hidden knowledge is extremely complex. Moreover this will be a great challenge for the developers of semantic technologies. This work aims to explore ways to make explicit and available the tacit knowledge hidden in the collective intelligence of a collaborative environment within organizations. The environment was defined by folksonomies supported by a faceted semantic search. Vector space model which incorporates an analogy with the mathematical appar...

  6. Tails assumptions and posterior concentration rates for mixtures of Gaussians

    OpenAIRE

    Naulet, Zacharie; Rousseau, Judith

    2016-01-01

    Nowadays in density estimation, posterior rates of convergence for location and location-scale mixtures of Gaussians are only known under light-tail assumptions; with better rates achieved by location mixtures. It is conjectured, but not proved, that the situation should be reversed under heavy tails assumptions. The conjecture is based on the feeling that there is no need to achieve a good order of approximation in regions with few data (say, in the tails), favoring location-scale mixtures w...

  7. US Intervention in Failed States: Bad Assumptions=Poor Outcomes

    Science.gov (United States)

    2002-01-01

    NATIONAL DEFENSE UNIVERSITY NATIONAL WAR COLLEGE STRATEGIC LOGIC ESSAY US INTERVENTION IN FAILED STATES: BAD ASSUMPTIONS = POOR ...2002 2. REPORT TYPE 3. DATES COVERED 00-00-2002 to 00-00-2002 4. TITLE AND SUBTITLE US Intervention in Failed States: Bad Assumptions= Poor ...country remains in the grip of poverty , natural disasters, and stagnation. Rwanda Rwanda, another small African country, is populated principally

  8. VISIBLE COSTS AND HIDDEN COSTS IN THE BAKING INDUSTRY

    Directory of Open Access Journals (Sweden)

    Criveanu Maria

    2013-04-01

    Full Text Available Hidden costs are present in the activity of any company, hardly identified in the traditional administrative accounting. The high levels of the hidden costs and their unknown presence have serious consequences on the decisions made by the managers. This paper aims at presenting some aspects related to the hidden costs that occur in the activity of the companies in the baking industry and the possibilities to reduce their level.

  9. Hidden History: A Mobile Application for Discovering Surrounding Landscapes

    OpenAIRE

    2016-01-01

    This thesis work describes the design, development and evaluation of a mobile application called Hidden History. This application lets users discover and explore three types of landscapes (Historic, Scenic and Cultural) using three different modes of discovery (Route, Explore and Tour). Before designing Hidden History, the feature set of other applications that help users explore surrounding landscapes were identified and analyzed. Hidden History was then designed to implement the best fea...

  10. HIDDEN WEB EXTRACTOR DYNAMIC WAY TO UNCOVER THE DEEP WEB

    OpenAIRE

    DR. ANURADHA; BABITA AHUJA

    2012-01-01

    In this era of digital tsunami of information on the web, everyone is completely dependent on the WWW for information retrieval. This has posed a challenging problem in extracting relevant data. Traditional web crawlers focus only on the surface web while the deep web keeps expanding behind the scene. The web databases are hidden behind the query interfaces. In this paper, we propose a Hidden Web Extractor (HWE) that can automatically discover and download data from the Hidden Web databases. ...

  11. ADAPTIVE LEARNING OF HIDDEN MARKOV MODELS FOR EMOTIONAL SPEECH

    Directory of Open Access Journals (Sweden)

    A. V. Tkachenia

    2014-01-01

    Full Text Available An on-line unsupervised algorithm for estimating the hidden Markov models (HMM parame-ters is presented. The problem of hidden Markov models adaptation to emotional speech is solved. To increase the reliability of estimated HMM parameters, a mechanism of forgetting and updating is proposed. A functional block diagram of the hidden Markov models adaptation algorithm is also provided with obtained results, which improve the efficiency of emotional speech recognition.

  12. Hidden Photons in Aharonov-Bohm-Type Experiments

    OpenAIRE

    Arias, Paola; Diaz, Christian; Diaz, Marco Aurelio; Jaeckel, Joerg; Koch, Benjamin; Redondo, Javier

    2016-01-01

    We discuss the Aharonov-Bohm effect in the presence of hidden photons kinetically mixed with the ordinary electromagnetic photons. The hidden photon field causes a slight phase shift in the observable interference pattern. It is then shown how the limited sensitivity of this experiment can be largely improved. The key observation is that the hidden photon field causes a leakage of the ordinary magnetic field into the supposedly field-free region. The direct measurement of this magnetic field ...

  13. VISIBLE COSTS AND HIDDEN COSTS IN THE BAKING INDUSTRY

    OpenAIRE

    Criveanu Maria; Ţaicu Marian

    2013-01-01

    Hidden costs are present in the activity of any company, hardly identified in the traditional administrative accounting. The high levels of the hidden costs and their unknown presence have serious consequences on the decisions made by the managers. This paper aims at presenting some aspects related to the hidden costs that occur in the activity of the companies in the baking industry and the possibilities to reduce their level.

  14. System Energy Assessment (SEA, Defining a Standard Measure of EROI for Energy Businesses as Whole Systems

    Directory of Open Access Journals (Sweden)

    Jay Zarnikau

    2011-10-01

    Full Text Available A more objective method for measuring the energy needs of businesses, System Energy Assessment (SEA, measures the combined impacts of material supply chains and service supply chains, to assess businesses as whole self-managing net-energy systems. The method is demonstrated using a model Wind Farm, and defines a physical measure of their energy productivity for society (EROI-S, a ratio of total energy delivered to total energy expended. Energy use records for technology and proxy measures for clearly understood but not individually recorded energy uses for services are combined for a whole system estimate of consumption required for production. Current methods count only energy needs for technology. Business services outsource their own energy needs to operate, leaving no traceable record. That uncounted business energy demand is often 80% of the total, an amount of “dark energy” hidden from view, discovered by finding the average energy estimated needs for businesses far below the world average energy consumed per dollar of GDP. Presently for lack of information the energy needs of business services are counted to be “0”. Our default assumption is to treat them as “average”. The result is a hard measure of total business demand for energy services, a “Scope 4” energy use or GHG impact assessment. Counting recorded energy uses and discounting unrecorded ones misrepresents labor intensive work as highly energy efficient. The result confirms a similar finding by Hall et al. in 1981 [1]. We use exhaustive search for what a business needs to operate as a whole, tracing internal business relationships rather than energy data, to locate its natural physical boundary as a working unit, and so define a business as a physical rather than statistical subject of scientific study. See also online resource materials and notes [2].

  15. Clustering Multivariate Time Series Using Hidden Markov Models

    Directory of Open Access Journals (Sweden)

    Shima Ghassempour

    2014-03-01

    Full Text Available In this paper we describe an algorithm for clustering multivariate time series with variables taking both categorical and continuous values. Time series of this type are frequent in health care, where they represent the health trajectories of individuals. The problem is challenging because categorical variables make it difficult to define a meaningful distance between trajectories. We propose an approach based on Hidden Markov Models (HMMs, where we first map each trajectory into an HMM, then define a suitable distance between HMMs and finally proceed to cluster the HMMs with a method based on a distance matrix. We test our approach on a simulated, but realistic, data set of 1,255 trajectories of individuals of age 45 and over, on a synthetic validation set with known clustering structure, and on a smaller set of 268 trajectories extracted from the longitudinal Health and Retirement Survey. The proposed method can be implemented quite simply using standard packages in R and Matlab and may be a good candidate for solving the difficult problem of clustering multivariate time series with categorical variables using tools that do not require advanced statistic knowledge, and therefore are accessible to a wide range of researchers.

  16. AdS/QCD approach to the scale invariant extension of the standard model with a strongly interacting hidden sector

    CERN Document Server

    Hatanaka, Hisaki; Ko, Pyungwon

    2016-01-01

    In this paper, we revisit a scale-invariant extension of the standard model (SM) with a strongly interacting hidden sector within AdS/QCD approach. Using the AdS/QCD, we reduce the number of input parameters to three, i.e. hidden pion decay constant, hidden pion mass and $\\tan\\beta$ that is defined as the ratio of the vacuum expectation values (VEV) of the singlet scalar field and the SM Higgs boson. As a result, our model has sharp predictability. We perform the phenomenological analysis of the hidden pions which is one of the dark matter (DM) candidates in this model. With various theoretical and experimental constraints we search for the allowed parameter space and find that both resonance and non-resonance solutions are possible. Some typical correlations among various observables such as thermal relic density of hidden pions, Higgs signal strengths and DM-nucleon cross section are investigated. We provide some benchmark points for experimental tests.

  17. Defining Legal Moralism

    DEFF Research Database (Denmark)

    Thaysen, Jens Damgaard

    2015-01-01

    This paper discusses how legal moralism should be defined. It is argued that legal moralism should be defined as the position that “For any X, it is always a pro tanto reason for justifiably imposing legal regulation on X that X is morally wrong (where “morally wrong” is not conceptually equivalent...

  18. Simple estimates of the hidden beauty pentaquarks masses

    CERN Document Server

    Kopeliovich, Vladimir

    2015-01-01

    The masses of cryptoexotic pentaquarks with hidden beauty are estimated phenomenologically using the results by the LHCb collaboration which discovered recently the cryptoexotic pentaquarks with hidden charm. The expected masses of the hidden beauty pentaquarks are about $10.8\\, GeV$ and $10.7\\,GeV$ in the limit of some kind of heavy quark symmetry. The states with hidden strangeness considered in similar way have masses above $2\\, Gev$, by several hundreds of $MeV$ higher than states discussed previously in connection with the relatively light positive strangeness pentaquark $\\theta^+$.

  19. Critical scaling in hidden state inference for linear Langevin dynamics

    OpenAIRE

    Bravi, Barbara; Sollich, Peter

    2016-01-01

    We consider the problem of inferring the dynamics of unknown (i.e. hidden) nodes from a set of observed trajectories and we study analytically the average prediction error given by the Extended Plefka Expansion applied to it, as presented in [1]. We focus on a stochastic linear dynamics of continuous degrees of freedom interacting via random Gaussian couplings in the infinite network size limit. The expected error on the hidden time courses can be found as the equal-time hidden-to-hidden cova...

  20. Error statistics of hidden Markov model and hidden Boltzmann model results

    Directory of Open Access Journals (Sweden)

    Newberg Lee A

    2009-07-01

    Full Text Available Abstract Background Hidden Markov models and hidden Boltzmann models are employed in computational biology and a variety of other scientific fields for a variety of analyses of sequential data. Whether the associated algorithms are used to compute an actual probability or, more generally, an odds ratio or some other score, a frequent requirement is that the error statistics of a given score be known. What is the chance that random data would achieve that score or better? What is the chance that a real signal would achieve a given score threshold? Results Here we present a novel general approach to estimating these false positive and true positive rates that is significantly more efficient than are existing general approaches. We validate the technique via an implementation within the HMMER 3.0 package, which scans DNA or protein sequence databases for patterns of interest, using a profile-HMM. Conclusion The new approach is faster than general naïve sampling approaches, and more general than other current approaches. It provides an efficient mechanism by which to estimate error statistics for hidden Markov model and hidden Boltzmann model results.

  1. Error statistics of hidden Markov model and hidden Boltzmann model results

    Science.gov (United States)

    Newberg, Lee A

    2009-01-01

    Background Hidden Markov models and hidden Boltzmann models are employed in computational biology and a variety of other scientific fields for a variety of analyses of sequential data. Whether the associated algorithms are used to compute an actual probability or, more generally, an odds ratio or some other score, a frequent requirement is that the error statistics of a given score be known. What is the chance that random data would achieve that score or better? What is the chance that a real signal would achieve a given score threshold? Results Here we present a novel general approach to estimating these false positive and true positive rates that is significantly more efficient than are existing general approaches. We validate the technique via an implementation within the HMMER 3.0 package, which scans DNA or protein sequence databases for patterns of interest, using a profile-HMM. Conclusion The new approach is faster than general naïve sampling approaches, and more general than other current approaches. It provides an efficient mechanism by which to estimate error statistics for hidden Markov model and hidden Boltzmann model results. PMID:19589158

  2. Evolving the structure of hidden Markov Models

    DEFF Research Database (Denmark)

    won, K. J.; Prugel-Bennett, A.; Krogh, A.

    2006-01-01

    A genetic algorithm (GA) is proposed for finding the structure of hidden Markov Models (HMMs) used for biological sequence analysis. The GA is designed to preserve biologically meaningful building blocks. The search through the space of HMM structures is combined with optimization of the emission...... and transition probabilities using the classic Baum-Welch algorithm. The system is tested on the problem of finding the promoter and coding region of C. jejuni. The resulting HMM has a superior discrimination ability to a handcrafted model that has been published in the literature....

  3. OFDM System Channel Estimation with Hidden Pilot

    Institute of Scientific and Technical Information of China (English)

    YANG Feng; LIN Cheng-yu; ZHANG Wen-jun

    2007-01-01

    Channel estimation using pilot is common used in OFDM system. The pilot is usually time division multiplexed with the informative sequence. One of the main drawbacks is bandwidth losing. In this paper, a new method was proposed to perform channel estimation in OFDM system. The pilot is arithmetically added to the output of OFDM modulator. Receiver uses the hidden pilot to get an accurate estimation of the channel. Then pilot is removed after channel estimation. The Cramer-Rao lower bound for this method was deprived. The performance of the algorithm is then shown. Compared with traditional methods, the proposed algorithm increases the bandwidth efficiency dramatically.

  4. Pruning Boltzmann networks and hidden Markov models

    DEFF Research Database (Denmark)

    Pedersen, Morten With; Stork, D.

    1996-01-01

    We present sensitivity-based pruning algorithms for general Boltzmann networks. Central to our methods is the efficient calculation of a second-order approximation to the true weight saliencies in a cross-entropy error. Building upon previous work which shows a formal correspondence between linear...... Boltzmann chains and hidden Markov models (HMMs), we argue that our method can be applied to HMMs as well. We illustrate pruning on Boltzmann zippers, which are equivalent to two HMMs with cross-connection links. We verify that our second-order approximation preserves the rank ordering of weight saliencies...

  5. Hidden photon CDM search at Tokyo

    CERN Document Server

    Suzuki, Jun'ya; Horie, Tomoki; Minowa, Makoto

    2015-01-01

    We report on a search for hidden photon cold dark matter (HP CDM) using a novel technique with a dish antenna. We constructed two independent apparatus: one is aiming at the detection of the HP with a mass of $\\sim\\,\\rm{eV}$ which employs optical instruments, and the other is for a mass of $\\sim5\\times10^{-5}\\, \\rm{eV}$ utilizing a commercially available parabolic antenna facing on a plane reflector. From the result of the measurements, we found no evidence for the existence of HP CDM and set upper limits on the photon-HP mixing parameter $\\chi$.

  6. Maurice Halbwachs: Official and hidden memory

    Directory of Open Access Journals (Sweden)

    Carretero, Angel

    2008-05-01

    Full Text Available This article tries to show, in general terms, how Maurice Halbwachs has discovered presence and vitality in the collective memorieswhich have been excluded from the socially-institutionalized world. In order to decipher his opaque writing, one should try for a sociology of the depths, for a sociological look that, separating itself from the dominant positivism of the social sciences, manages to penetrate the hidden logic that permanently underlies social life. This article seeks to uncover the nature of a collective memory that respects the vicissitudes of time, as well as its difficult relations both with official memory and with the dominant historical record.

  7. Die Beharrlichkeit im Verborgenen Hidden Persistence

    Directory of Open Access Journals (Sweden)

    Paula-Irene Villa

    2003-07-01

    Full Text Available Karin Flaake geht in ihrer psychoanalytischen Interpretation innerfamilialer Konstellationen der Frage nach, wie das Zur-Frau-Werden von jungen Frauen erlebt wird. Dabei kommt den körperliche Wandlungsprozessen der Pubertät und den darin eingelagerten expliziten sowie verborgenen Deutungen des Weiblichen – vor allem des weiblichen Körpers – durch die Eltern eine prominente Rolle zu.Karin Flaake’s psychoanalytical intepretations of family constellations explore how young women experience their coming of age and entering womanhood. Her analysis focuses on the bodily changes which women undergo during puberty and the explicit as well as hidden meanings assigned to them by the parents.

  8. Scaling dimensions in hidden Kerr/CFT

    CERN Document Server

    Lowe, David A; Skanata, Antun

    2011-01-01

    It has been proposed that a hidden conformal field theory (CFT) governs the dynamics of low frequency scattering in a general Kerr black hole background. We further investigate this correspondence by mapping higher order corrections to the massless wave equations in a Kerr background to an expansion within the CFT in terms of higher dimension operators. This implies the presence of infinite towers of CFT primary operators with positive conformal dimensions compatible with unitarity. The exact Kerr background softly breaks the conformal symmetry and the scaling dimensions of these operators run with frequency. The scale-invariant fixed point is dual to a degenerate case of flat spacetime.

  9. Hidden Kerr/CFT at finite frequencies

    CERN Document Server

    Lowe, David A; Skanata, Antun

    2013-01-01

    Massless fields propagating in a generic Kerr black hole background enjoy a hidden SL(2,R)xSL(2,R) symmetry. We determine how the exact mode functions decompose into representations of this symmetry group. This extends earlier results on the low frequency limit of the massless scalar case to finite frequencies and general spin. As an application, we numerically determine the parameters of the representations that appear in quasinormal modes. These results represent a first step to formulating a more precise mapping to a holographic dual conformal field theory for generic black holes.

  10. A New Hidden Web Crawling Approach

    OpenAIRE

    L.Saoudi; A.Boukerram; S.Mhamedi

    2015-01-01

    Traditional search engines deal with the Surface Web which is a set of Web pages directly accessible through hyperlinks and ignores a large part of the Web called hidden Web which is a great amount of valuable information of online database which is “hidden” behind the query forms. To access to those information the crawler have to fill the forms with a valid data, for this reason we propose a new approach which use SQLI technique in order to find the most promising keywords of a specific dom...

  11. Hidden Scale Invariance in Condensed Matter

    DEFF Research Database (Denmark)

    Dyre, J. C.

    2014-01-01

    . This means that the phase diagram becomes effectively one-dimensional with regard to several physical properties. Liquids and solids with isomorphs include most or all van der Waals bonded systems and metals, as well as weakly ionic or dipolar systems. On the other hand, systems with directional bonding...... (hydrogen bonds or covalent bonds) or strong Coulomb forces generally do not exhibit hidden scale invariance. The article reviews the theory behind this picture of condensed matter and the evidence for it coming from computer simulations and experiments...

  12. Genetic Algorithms Principles Towards Hidden Markov Model

    Directory of Open Access Journals (Sweden)

    Nabil M. Hewahi

    2011-10-01

    Full Text Available In this paper we propose a general approach based on Genetic Algorithms (GAs to evolve Hidden Markov Models (HMM. The problem appears when experts assign probability values for HMM, they use only some limited inputs. The assigned probability values might not be accurate to serve in other cases related to the same domain. We introduce an approach based on GAs to find
    out the suitable probability values for the HMM to be mostly correct in more cases than what have been used to assign the probability values.

  13. Fifty Years After, Hidden Children Speak

    Directory of Open Access Journals (Sweden)

    Léa Marcou

    2008-06-01

    Full Text Available “For fifty years, I have not spoken of my childhood years in France during the second world war. A hidden child, I lived under a false name amongst unknown people, being careful – as I had been taught – not to reveal, by a gesture or by a word, that I was Jewish. I knew I was in danger, still not understanding why and I was constantly afraid. I didn't know whether I would see again one day my parents from whom I had been suddenly taken away. Nonetheless what were my pains compared to those of...

  14. Uncovering the Hidden Costs of Offshoring

    DEFF Research Database (Denmark)

    Larsen, Marcus M.; Manning, Stephan; Pedersen, Torben

    2013-01-01

    This study investigates estimation errors due to hidden costs—the costs of implementation that are neglected in strategic decision-making processes—in the context of services offshoring. Based on data from the Offshoring Research Network, we find that decision makers are more likely to make cost......-estimation errors given increasing configuration and task complexity in captive offshoring and offshore outsourcing, respectively. Moreover, we show that experience and a strong orientation toward organizational design in the offshoring strategy reduce the cost-estimation errors that follow from complexity. Our...

  15. Parsing social network survey data from hidden populations using stochastic context-free grammars.

    Directory of Open Access Journals (Sweden)

    Art F Y Poon

    Full Text Available BACKGROUND: Human populations are structured by social networks, in which individuals tend to form relationships based on shared attributes. Certain attributes that are ambiguous, stigmatized or illegal can create a OhiddenO population, so-called because its members are difficult to identify. Many hidden populations are also at an elevated risk of exposure to infectious diseases. Consequently, public health agencies are presently adopting modern survey techniques that traverse social networks in hidden populations by soliciting individuals to recruit their peers, e.g., respondent-driven sampling (RDS. The concomitant accumulation of network-based epidemiological data, however, is rapidly outpacing the development of computational methods for analysis. Moreover, current analytical models rely on unrealistic assumptions, e.g., that the traversal of social networks can be modeled by a Markov chain rather than a branching process. METHODOLOGY/PRINCIPAL FINDINGS: Here, we develop a new methodology based on stochastic context-free grammars (SCFGs, which are well-suited to modeling tree-like structure of the RDS recruitment process. We apply this methodology to an RDS case study of injection drug users (IDUs in Tijuana, México, a hidden population at high risk of blood-borne and sexually-transmitted infections (i.e., HIV, hepatitis C virus, syphilis. Survey data were encoded as text strings that were parsed using our custom implementation of the inside-outside algorithm in a publicly-available software package (HyPhy, which uses either expectation maximization or direct optimization methods and permits constraints on model parameters for hypothesis testing. We identified significant latent variability in the recruitment process that violates assumptions of Markov chain-based methods for RDS analysis: firstly, IDUs tended to emulate the recruitment behavior of their own recruiter; and secondly, the recruitment of like peers (homophily was dependent on

  16. NGNP: High Temperature Gas-Cooled Reactor Key Definitions, Plant Capabilities, and Assumptions

    Energy Technology Data Exchange (ETDEWEB)

    Phillip Mills

    2012-02-01

    This document is intended to provide a Next Generation Nuclear Plant (NGNP) Project tool in which to collect and identify key definitions, plant capabilities, and inputs and assumptions to be used in ongoing efforts related to the licensing and deployment of a high temperature gas-cooled reactor (HTGR). These definitions, capabilities, and assumptions are extracted from a number of sources, including NGNP Project documents such as licensing related white papers [References 1-11] and previously issued requirement documents [References 13-15]. Also included is information agreed upon by the NGNP Regulatory Affairs group's Licensing Working Group and Configuration Council. The NGNP Project approach to licensing an HTGR plant via a combined license (COL) is defined within the referenced white papers and reference [12], and is not duplicated here.

  17. Error in the description of foot kinematics due to violation of rigid body assumptions.

    Science.gov (United States)

    Nester, C J; Liu, A M; Ward, E; Howard, D; Cocheba, J; Derrick, T

    2010-03-03

    Kinematic data from rigid segment foot models inevitably includes errors because the bones within each segment move relative to each other. This study sought to define error in foot kinematic data due to violation of the rigid segment assumption. The research compared kinematic data from 17 different mid and forefoot rigid segment models to kinematic data of the individual bones comprising these segments. Kinematic data from a previous dynamic cadaver model study was used to derive individual bone as well as foot segment kinematics. Mean and maximum errors due to violation of the rigid body assumption varied greatly between models. The model with least error was the combination of navicular and cuboid (mean errors kinematics research study being undertaken.

  18. Defining Documentary Film

    DEFF Research Database (Denmark)

    Juel, Henrik

    2006-01-01

    A discussion of various attemts at defining documentary film regarding form, content, truth, stile, genre or reception - and a propoposal of a positive list of essential, but non-exclusive characteristica of documentary film......A discussion of various attemts at defining documentary film regarding form, content, truth, stile, genre or reception - and a propoposal of a positive list of essential, but non-exclusive characteristica of documentary film...

  19. Definably amenable NIP groups

    OpenAIRE

    Chernikov, Artem; Simon, Pierre

    2015-01-01

    We study definably amenable NIP groups. We develop a theory of generics, showing that various definitions considered previously coincide, and study invariant measures. Applications include: characterization of regular ergodic measures, a proof of the conjecture of Petrykowski connecting existence of bounded orbits with definable amenability in the NIP case, and the Ellis group conjecture of Newelski and Pillay connecting the model-theoretic connected component of an NIP group with the ideal s...

  20. Polish mother and child cohort study--defining the problem, the aim of the study and methodological assumption.

    Science.gov (United States)

    Polańska, Kinga; Hanke, Wojciech; Gromadzińska, Jolanta; Ligocka, Danuta; Gulczyńska, Ewa; Sobala, Wojciech; Wásowicz, Wojciech

    2009-01-01

    Exposures during prenatal period have implications for pregnancy outcome as well as for children's health, morbidity and mortality. Prospective cohort study design allows for the identification of exposures that may influence pregnancy outcome and children's health, verification of such exposures by biomarker measurements and notification of any changes in exposure level. Polish Mother and Child Cohort Study (REPRO_PL) is multicenter prospective cohort study conducted in 8 different regions of Poland. The final cohort is intended to comprise 1300 mother-child pairs to be recruited within 4-year period (2007-2011). The recruitment and all scheduled visits are conducted in maternity units or clinics in the districts included in the study. The women are followed-up 3 times in pregnancy (once in each trimester) and after delivery for the notification of pregnancy outcome. During each visit, detailed questionnaire and biological samples are collected including saliva, urine, hair, maternal blood and cord blood. About 6 weeks postpartum, breast milk from part of the women is collected. The study concentrates on the identification and evaluation of the effects of prenatal environmental exposure on pregnancy outcome and children's health. Specific research hypotheses refer to the role of heavy metals, exposure to polycyclic aromatic hydrocarbons (PAHs) and environmental tobacco smoke (ETS) in the aetiology of small-for-gestational-age (SGA) and preterm delivery (PD). The role of oxidative stress putative mechanism and pregnant women nutritional status will be investigated. Based on questionnaire data, the impact of occupational exposures and stressful situations will be evaluated. The results of the study will become available within the next few years and will help to determine levels of child prenatal exposure in several areas of Poland and its impact on course and outcome of pregnancy.

  1. Women's hidden transcripts about abortion in Brazil.

    Science.gov (United States)

    Nations, M K; Misago, C; Fonseca, W; Correia, L L; Campbell, O M

    1997-06-01

    Two folk medical conditions, "delayed" (atrasada) and "suspended" (suspendida) menstruation, are described as perceived by poor Brazilian women in Northeast Brazil. Culturally prescribed methods to "regulate" these conditions and provoke menstrual bleeding are also described, including ingesting herbal remedies, patent drugs, and modern pharmaceuticals. The ingestion of such self-administered remedies is facilitated by the cognitive ambiguity, euphemisms, folklore, etc., which surround conception and gestation. The authors argue that the ethnomedical conditions of "delayed" and "suspended" menstruation and subsequent menstrual regulation are part of the "hidden reproductive transcript" of poor and powerless Brazilian women. Through popular culture, they voice their collective dissent to the official, public opinion about the illegality and immorality of induced abortion and the chronic lack of family planning services in Northeast Brazil. While many health professionals consider women's explanations of menstrual regulation as a "cover-up" for self-induced abortions, such popular justifications may represent either an unconscious or artful manipulation of hegemonic, anti-abortion ideology expressed in prudent, unobtrusive and veiled ways. The development of safer abortion alternatives should consider women's hidden reproductive transcripts.

  2. Atlas of solar hidden photon emission

    Energy Technology Data Exchange (ETDEWEB)

    Redondo, Javier [Departamento de Física Teórica, Universidad de Zaragoza,Pedro Cerbuna 12, E-50009, Zaragoza (Spain); Max-Planck-Institut für Physik, Werner-Heisenberg-Institut,Föhringer Ring 6, 80805 München (Germany)

    2015-07-20

    Hidden photons, gauge bosons of a U(1) symmetry of a hidden sector, can constitute the dark matter of the universe and a smoking gun for large volume compactifications of string theory. In the sub-eV mass range, a possible discovery experiment consists on searching the copious flux of these particles emitted from the Sun in a helioscope setup à la Sikivie. In this paper, we compute in great detail the flux of HPs from the Sun, a necessary ingredient for interpreting such experiments. We provide a detailed exposition of transverse photon-HP oscillations in inhomogenous media, with special focus on resonance oscillations, which play a leading role in many cases. The region of the Sun emitting HPs resonantly is a thin spherical shell for which we justify an averaged-emission formula and which implies a distinctive morphology of the angular distribution of HPs on Earth in many cases. Low mass HPs with energies in the visible and IR have resonances very close to the photosphere where the solar plasma is not fully ionised and requires building a detailed model of solar refraction and absorption. We present results for a broad range of HP masses (from 0–1 keV) and energies (from the IR to the X-ray range), the most complete atlas of solar HP emission to date.

  3. Epitope discovery with phylogenetic hidden Markov models.

    LENUS (Irish Health Repository)

    Lacerda, Miguel

    2010-05-01

    Existing methods for the prediction of immunologically active T-cell epitopes are based on the amino acid sequence or structure of pathogen proteins. Additional information regarding the locations of epitopes may be acquired by considering the evolution of viruses in hosts with different immune backgrounds. In particular, immune-dependent evolutionary patterns at sites within or near T-cell epitopes can be used to enhance epitope identification. We have developed a mutation-selection model of T-cell epitope evolution that allows the human leukocyte antigen (HLA) genotype of the host to influence the evolutionary process. This is one of the first examples of the incorporation of environmental parameters into a phylogenetic model and has many other potential applications where the selection pressures exerted on an organism can be related directly to environmental factors. We combine this novel evolutionary model with a hidden Markov model to identify contiguous amino acid positions that appear to evolve under immune pressure in the presence of specific host immune alleles and that therefore represent potential epitopes. This phylogenetic hidden Markov model provides a rigorous probabilistic framework that can be combined with sequence or structural information to improve epitope prediction. As a demonstration, we apply the model to a data set of HIV-1 protein-coding sequences and host HLA genotypes.

  4. Atlas of solar hidden photon emission

    CERN Document Server

    Redondo, Javier

    2015-01-01

    Hidden photons, gauge bosons of a U(1) symmetry of a hidden sector, can constitute the dark matter of the universe and a smoking gun for large volume compactifications of string theory. In the sub-eV mass range, a possible discovery experiment consists on searching the copious flux of these particles emitted from the Sun in a helioscope setup \\`a la Sikivie. In this paper, we compute the flux of transversely polarised HPs from the Sun, a necessary ingredient for interpreting such experiments. We provide a detailed exposition of photon-HP oscillations in inhomogenous media, with special focus on resonance oscillations, which play a leading role in many cases. The region of the Sun emitting HPs resonantly is a thin spherical shell for which we justify an averaged-emission formula and which implies a distinctive morphology of the angular distribution of HPs on Earth in many cases. Low mass HPs with energies in the visible and IR have resonances very close to the photosphere where the solar plasma is not fully io...

  5. Quantum Hidden Subgroup Problems A Mathematical Perspective

    CERN Document Server

    Lomonaco, S J; Lomonaco, Samuel J.; Kauffman, Louis H.

    2002-01-01

    The ultimate objective of this paper is to create a stepping stone to the development of new quantum algorithms. The strategy chosen is to begin by focusing on the class of abelian quantum hidden subgroup algorithms, i.e., the class of abelian algorithms of the Shor/Simon genre. Our strategy is to make this class of algorithms as mathematically transparent as possible. By the phrase "mathematically transparent" we mean to expose, to bring to the surface, and to make explicit the concealed mathematical structures that are inherently and fundamentally a part of such algorithms. In so doing, we create symbolic abelian quantum hidden subgroup algorithms that are analogous to the those symbolic algorithms found within such software packages as Axiom, Cayley, Maple, Mathematica, and Magma. As a spin-off of this effort, we create three different generalizations of Shor's quantum factoring algorithm to free abelian groups of finite rank. We refer to these algorithms as wandering (or vintage Z_Q) Shor algorithms. They...

  6. ESO's Hidden Treasures Brought to Light

    Science.gov (United States)

    2011-01-01

    ESO's Hidden Treasures 2010 astrophotography competition attracted nearly 100 entries, and ESO is delighted to announce the winners. Hidden Treasures gave amateur astronomers the opportunity to search ESO's vast archives of astronomical data for a well-hidden cosmic gem. Astronomy enthusiast Igor Chekalin from Russia won the first prize in this difficult but rewarding challenge - the trip of a lifetime to ESO's Very Large Telescope at Paranal, Chile. The pictures of the Universe that can be seen in ESO's releases are impressive. However, many hours of skilful work are required to assemble the raw greyscale data captured by the telescopes into these colourful images, correcting them for distortions and unwanted signatures of the instrument, and enhancing them so as to bring out the details contained in the astronomical data. ESO has a team of professional image processors, but for the ESO's Hidden Treasures 2010 competition, the experts decided to give astronomy and photography enthusiasts the opportunity to show the world what they could do with the mammoth amount of data contained in ESO's archives. The enthusiasts who responded to the call submitted nearly 100 entries in total - far exceeding initial expectations, given the difficult nature of the challenge. "We were completely taken aback both by the quantity and the quality of the images that were submitted. This was not a challenge for the faint-hearted, requiring both an advanced knowledge of data processing and an artistic eye. We are thrilled to have discovered so many talented people," said Lars Lindberg Christensen, Head of ESO's education and Public Outreach Department. Digging through many terabytes of professional astronomical data, the entrants had to identify a series of greyscale images of a celestial object that would reveal the hidden beauty of our Universe. The chance of a great reward for the lucky winner was enough to spur on the competitors; the first prize being a trip to ESO's Very Large

  7. Hidden Markov Model for Stock Selection

    Directory of Open Access Journals (Sweden)

    Nguyet Nguyen

    2015-10-01

    Full Text Available The hidden Markov model (HMM is typically used to predict the hidden regimes of observation data. Therefore, this model finds applications in many different areas, such as speech recognition systems, computational molecular biology and financial market predictions. In this paper, we use HMM for stock selection. We first use HMM to make monthly regime predictions for the four macroeconomic variables: inflation (consumer price index (CPI, industrial production index (INDPRO, stock market index (S&P 500 and market volatility (VIX. At the end of each month, we calibrate HMM’s parameters for each of these economic variables and predict its regimes for the next month. We then look back into historical data to find the time periods for which the four variables had similar regimes with the forecasted regimes. Within those similar periods, we analyze all of the S&P 500 stocks to identify which stock characteristics have been well rewarded during the time periods and assign scores and corresponding weights for each of the stock characteristics. A composite score of each stock is calculated based on the scores and weights of its features. Based on this algorithm, we choose the 50 top ranking stocks to buy. We compare the performances of the portfolio with the benchmark index, S&P 500. With an initial investment of $100 in December 1999, over 15 years, in December 2014, our portfolio had an average gain per annum of 14.9% versus 2.3% for the S&P 500.

  8. Hidden charm molecules in finite volume

    CERN Document Server

    Albaladejo, Miguel; Nieves, Juan; Oset, Eulogio

    2013-01-01

    In the present paper we address the interaction of pairs of charmed mesons with hidden charm in a finite box. We use the interaction from a recent model based on heavy quark spin symmetry that predicts molecules of hidden charm in the infinite volume. The energy levels in the box are generated within this model, and from them some synthetic data are generated. These data are then employed to study the inverse problem of getting the energies of the bound states and phase shifts for $D \\bar D$ or $D^* {\\bar D}^*$. Different strategies are investigated using the lowest two levels for different values of the box size, carrying a study of the errors produced. Starting from the upper level, fits to the synthetic data are carried out to determine the scattering length and effective range plus the binding energy of the ground state. A similar strategy using the effective range formula is considered with a simultaneous fit to the two levels, one above and the other one below threshold. This method turns out to be more...

  9. Laser experiments explore the hidden sector

    Energy Technology Data Exchange (ETDEWEB)

    Ahlers, M. [Oxford Univ. (United Kingdom). Rudolf Peierls Centre for Theoretical Physics; Gies, H. [Heidelberg Univ. (Germany). Inst. fuer Theoretische Physik; Jaeckel, J. [Heidelberg Univ. (Germany). Inst. fuer Theoretische Physik]|[Durham Univ. (United Kingdom). Inst. for Particle Physics Phenomenology; Redondo, J.; Ringwald, A. [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany)

    2007-11-15

    Recently, the laser experiments BMV and GammeV, searching for light shining through walls, have published data and calculated new limits on the allowed masses and couplings for axion-like particles. In this note we point out that these experiments can serve to constrain a much wider variety of hidden-sector particles such as, e.g., minicharged particles and hidden-sector photons. The new experiments improve the existing bounds from the older BFRT experiment by a factor of two. Moreover, we use the new PVLAS constraints on a possible rotation and ellipticity of light after it has passed through a strong magnetic field to constrain pure minicharged particle models. For masses

  10. Bayesian structural inference for hidden processes.

    Science.gov (United States)

    Strelioff, Christopher C; Crutchfield, James P

    2014-04-01

    We introduce a Bayesian approach to discovering patterns in structurally complex processes. The proposed method of Bayesian structural inference (BSI) relies on a set of candidate unifilar hidden Markov model (uHMM) topologies for inference of process structure from a data series. We employ a recently developed exact enumeration of topological ε-machines. (A sequel then removes the topological restriction.) This subset of the uHMM topologies has the added benefit that inferred models are guaranteed to be ε-machines, irrespective of estimated transition probabilities. Properties of ε-machines and uHMMs allow for the derivation of analytic expressions for estimating transition probabilities, inferring start states, and comparing the posterior probability of candidate model topologies, despite process internal structure being only indirectly present in data. We demonstrate BSI's effectiveness in estimating a process's randomness, as reflected by the Shannon entropy rate, and its structure, as quantified by the statistical complexity. We also compare using the posterior distribution over candidate models and the single, maximum a posteriori model for point estimation and show that the former more accurately reflects uncertainty in estimated values. We apply BSI to in-class examples of finite- and infinite-order Markov processes, as well to an out-of-class, infinite-state hidden process.

  11. Changing Assumptions and Progressive Change in Theories of Strategic Organization

    DEFF Research Database (Denmark)

    Foss, Nicolai J.; Hallberg, Niklas L.

    2016-01-01

    are often decoupled from the results of empirical testing, changes in assumptions seem closely intertwined with theoretical progress. Using the case of the resource-based view, we suggest that progressive change in theories of strategic organization may come about as a result of scholarly debate and dispute...... over what constitutes proper assumptions—even in the absence of corroborating or falsifying empirical evidence. We also discuss how changing assumptions may drive future progress in the resource-based view.......A commonly held view is that strategic organization theories progress as a result of a Popperian process of bold conjectures and systematic refutations. However, our field also witnesses vibrant debates or disputes about the specific assumptions that our theories rely on, and although these debates...

  12. Respondent-Driven Sampling – Testing Assumptions: Sampling with Replacement

    Directory of Open Access Journals (Sweden)

    Barash Vladimir D.

    2016-03-01

    Full Text Available Classical Respondent-Driven Sampling (RDS estimators are based on a Markov Process model in which sampling occurs with replacement. Given that respondents generally cannot be interviewed more than once, this assumption is counterfactual. We join recent work by Gile and Handcock in exploring the implications of the sampling-with-replacement assumption for bias of RDS estimators. We differ from previous studies in examining a wider range of sampling fractions and in using not only simulations but also formal proofs. One key finding is that RDS estimates are surprisingly stable even in the presence of substantial sampling fractions. Our analyses show that the sampling-with-replacement assumption is a minor contributor to bias for sampling fractions under 40%, and bias is negligible for the 20% or smaller sampling fractions typical of field applications of RDS.

  13. On the Necessary and Sufficient Assumptions for UC Computation

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Nielsen, Jesper Buus; Orlandi, Claudio

    2010-01-01

    We study the necessary and sufficient assumptions for universally composable (UC) computation, both in terms of setup and computational assumptions. We look at the common reference string model, the uniform random string model and the key-registration authority model (KRA), and provide new results...... for all of them. Perhaps most interestingly we show that: •  For even the minimal meaningful KRA, where we only assume that the secret key is a value which is hard to compute from the public key, one can UC securely compute any poly-time functionality if there exists a passive secure oblivious......-transfer protocol for the stand-alone model. Since a KRA where the secret keys can be computed from the public keys is useless, and some setup assumption is needed for UC secure computation, this establishes the best we could hope for the KRA model: any non-trivial KRA is sufficient for UC computation. •  We show...

  14. More Efficient VLR Group Signature Based on DTDH Assumption

    Directory of Open Access Journals (Sweden)

    Lizhen Ma

    2012-10-01

    Full Text Available In VLR (verifier-local revocation group signature, only verifiers are involved in the revocation of a member, while signers are not. Thus the VLR group signature schemes are suitable for mobile environments. To meet the requirement of speediness, reducing computation costs and shortening signature length are two requirements at the current research of VLR group signatures. A new VLR group signature is proposed based on q-SDH assumption and DTDH assumption. Compared with the existing VLR group signatures based on DTDH assumption, the  proposed scheme not only has the shortest signature size, but also has the lowest computation costs , and can be applicable to mobile environments such as IEEE 802.1x.  

  15. Discourses and Theoretical Assumptions in IT Project Portfolio Management

    DEFF Research Database (Denmark)

    Hansen, Lars Kristian; Kræmmergaard, Pernille

    2014-01-01

    DISCOURSES AND THEORETICAL ASSUMPTIONS IN IT PROJECT PORTFOLIO MANAGEMENT: A REVIEW OF THE LITERATURE These years increasing interest is put on IT project portfolio management (IT PPM). Considering IT PPM an interdisciplinary practice, we conduct a concept-based literature review of relevant...... to articulate and discuss underlying and conflicting assumptions in IT PPM, serving as a basis for adjusting organizations’ IT PPM practices. Keywords: IT project portfolio management or IT PPM, literature review, scientific discourses, underlying assumptions, unintended consequences, epistemological biases......: (1) IT PPM as the top management marketplace, (2) IT PPM as the cause of social dilemmas at the lower organizational levels (3) IT PPM as polity between different organizational interests, (4) IT PPM as power relations that suppress creativity and diversity. Our metaphors can be used by practitioners...

  16. Quantum algorithm for identifying hidden polynomial function graphs

    NARCIS (Netherlands)

    Decker, T.; Draisma, J.; Wocjan, P.

    2009-01-01

    We consider a natural generalization of an abelian Hidden Subgroup Problem where the subgroups and their cosets correspond to graphs of linear functions over a finite field F with d elements. The hidden functions of the generalized problem are not restricted to be linear but can also be m-variate po

  17. Hidden attractor in the Rabinovich system, Chua circuits and PLL

    Science.gov (United States)

    Kuznetsov, N. V.; Leonov, G. A.; Mokaev, T. N.; Seledzhi, S. M.

    2016-06-01

    In this report the existence of hidden attractors in Rabinovich system, phase-locked loop and coupled Chua circuits is considered. It is shown that the existence of hidden attractors may complicate the analysis of the systems and significantly affect the synchronization.

  18. Searching for hidden sector in multiparticle production at LHC

    Directory of Open Access Journals (Sweden)

    Miguel-Angel Sanchis-Lozano

    2016-03-01

    Full Text Available We study the impact of a hidden sector beyond the Standard Model, e.g. a Hidden Valley model, on factorial moments and cumulants of multiplicity distributions in multiparticle production with a special emphasis on the prospects for LHC results.

  19. Seuss's Butter Battle Book: Is There Hidden Harm?

    Science.gov (United States)

    Van Cleaf, David W.; Martin, Rita J.

    1986-01-01

    Examines whether elementary school children relate to the "harmful hidden message" about nuclear war in Dr. Seuss's THE BUTTER BATTLE BOOK. After ascertaining the children's cognitive level, they participated in activities to find hidden meanings in stories, including Seuss's book. Students failed to identify the nuclear war message in Seuss's…

  20. An introduction to hidden Markov models for biological sequences

    DEFF Research Database (Denmark)

    Krogh, Anders Stærmose

    1998-01-01

    A non-matematical tutorial on hidden Markov models (HMMs) plus a description of one of the applications of HMMs: gene finding.......A non-matematical tutorial on hidden Markov models (HMMs) plus a description of one of the applications of HMMs: gene finding....

  1. Detecting Hidden Hierarchy of Non Hierarchical Terrorist Networks

    DEFF Research Database (Denmark)

    Memon, Nasrullah

    to analyze terrorist networks and prioritize their targets. Applying recently introduced mathematical methods for constructing the hidden hierarchy of "nonhierarchical" terrorist networks; we present case studies of the terrorist attacks occurred / planned in the past, in order to identify hidden hierarchy...

  2. Assumptions behind size-based ecosystem models are realistic

    DEFF Research Database (Denmark)

    Andersen, Ken Haste; Blanchard, Julia L.; Fulton, Elizabeth A.;

    2016-01-01

    A recent publication about balanced harvesting (Froese et al., ICES Journal of Marine Science; doi:10.1093/icesjms/fsv122) contains several erroneous statements about size-spectrum models. We refute the statements by showing that the assumptions pertaining to size-spectrum models discussed...... by Froese et al. are realistic and consistent. We further show that the assumption about density-dependence being described by a stock recruitment relationship is responsible for determining whether a peak in the cohort biomass of a population occurs late or early in life. Finally, we argue...

  3. A Radio for Hidden-Photon Dark Matter Detection

    CERN Document Server

    Chaudhuri, Saptarshi; Irwin, Kent; Mardon, Jeremy; Rajendran, Surjeet; Zhao, Yue

    2014-01-01

    We propose a resonant electromagnetic detector to search for hidden-photon dark matter over an extensive range of masses. Hidden-photon dark matter can be described as a weakly coupled "hidden electric field," oscillating at a frequency fixed by the mass, and able to penetrate any shielding. At low frequencies (compared to the inverse size of the shielding), we find that observable effect of the hidden photon inside any shielding is a real, oscillating magnetic field. We outline experimental setups designed to search for hidden-photon dark matter, using a tunable, resonant LC circuit designed to couple to this magnetic field. Our "straw man" setups take into consideration resonator design, readout architecture and noise estimates. At high frequencies,there is an upper limit to the useful size of a single resonator set by $1/\

  4. Secluded Dark Matter Coupled to a Hidden CFT

    CERN Document Server

    von Harling, Benedict

    2012-01-01

    Models of secluded dark matter offer a variant on the standard WIMP picture and can modify our expectations for hidden sector phenomenology and detection. In this work we extend a minimal model of secluded dark matter, comprised of a U(1)'-charged dark matter candidate, to include a confining hidden-sector CFT. This provides a technically natural explanation for the hierarchically small mediator-scale, with hidden-sector confinement generating m_{gamma'}>0. Furthermore, the thermal history of the universe can differ markedly from the WIMP picture due to (i) new annihilation channels, (ii) a (potentially) large number of hidden-sector degrees of freedom, and (iii) a hidden-sector phase transition at temperatures T << M_{dm} after freeze out. The mediator allows both the dark matter and the Standard Model to communicate with the CFT, thus modifying the low-energy phenomenology and cosmic-ray signals from the secluded sector.

  5. Abelian Hidden Sectors at a GeV

    Energy Technology Data Exchange (ETDEWEB)

    Morrissey, David E.; Poland, David; /Harvard U.; Zurek, Kathryn; /Fermilab /Michigan U.

    2009-04-16

    We discuss mechanisms for naturally generating GeV-scale hidden sectors in the context of weak-scale supersymmetry. Such low mass scales can arise when hidden sectors are more weakly coupled to supersymmetry breaking than the visible sector, as happens when supersymmetry breaking is communicated to the visible sector by gauge interactions under which the hidden sector is uncharged, or if the hidden sector is sequestered from gravity-mediated supersymmetry breaking. We study these mechanisms in detail in the context of gauge and gaugino mediation, and present specific models of Abelian GeV-scale hidden sectors. In particular, we discuss kinetic mixing of a U(1){sub x} gauge force with hypercharge, singlets or bi-fundamentals which couple to both sectors, and additional loop effects. Finally, we investigate the possible relevance of such sectors for dark matter phenomenology, as well as for low- and high-energy collider searches.

  6. HIDDEN WEB EXTRACTOR DYNAMIC WAY TO UNCOVER THE DEEP WEB

    Directory of Open Access Journals (Sweden)

    DR. ANURADHA

    2012-06-01

    Full Text Available In this era of digital tsunami of information on the web, everyone is completely dependent on the WWW for information retrieval. This has posed a challenging problem in extracting relevant data. Traditional web crawlers focus only on the surface web while the deep web keeps expanding behind the scene. The web databases are hidden behind the query interfaces. In this paper, we propose a Hidden Web Extractor (HWE that can automatically discover and download data from the Hidden Web databases. Since the only “entry point” to a Hidden Web site is a query interface, the main challenge that a Hidden WebExtractor has to face is how to automatically generate meaningful queries for the unlimited number of website pages.

  7. Gauge Coupling Unification with Hidden Photon, and Minicharged Dark Matter

    CERN Document Server

    Daido, Ryuji; Yokozaki, Norimi

    2016-01-01

    We show that gauge coupling unification is realized with a greater accuracy in the presence of a massless hidden photon which has a large kinetic mixing with hypercharge. We solve the renormalization group equations at two-loop level and find that the GUT unification scale is around $10^{16.5}$ GeV which sufficiently suppresses the proton decay rate, and that the unification depends only on the kinetic mixing, but not on the hidden gauge coupling nor the presence of vector-like matter fields charged under U(1)$_H$ and/or SU(5). Matter fields charged under the unbroken hidden U(1)$_H$ are stable and they contribute to dark matter. Interestingly, they become minicharged dark matter which carries a small but non-zero electric charge, if the hidden gauge coupling is tiny. The minicharged dark matter is a natural outcome of the gauge coupling unification with a hidden photon.

  8. A Hidden-Removal Model of Dam Perspective Drawing

    Institute of Scientific and Technical Information of China (English)

    WANG Zi-ru; ZHOU Hui-cheng; LI Ming-qiu

    2011-01-01

    Aming at water conservancy project visualization, a hidden-removal method of dam perspective drawings is realized by building a hidden-removal mathematical model for overlapping points location to set up the hidden relationship among point and plane, plane and plane in space. On this basis, as an example of panel rockfill dam, a dam hidden-removal perspective drawing is generated in different directions and different visual angles through adapting VC++ and OpenGL visualizing technology. The results show that the data construction of the model is simple which can overcome the disadvantages of considerable and complicated calculation. This method also provides the new means to draw hidden-removal perspective drawings for those landforms and ground objects.

  9. Can play be defined?

    DEFF Research Database (Denmark)

    Eichberg, Henning

    2015-01-01

    Can play be defined? There is reason to raise critical questions about the established academic demand that at phenomenon – also in humanist studies – should first of all be defined, i.e. de-lineated and by neat lines limited to a “little box” that can be handled. The following chapter develops t....... Human beings can very well understand play – or whatever phenomenon in human life – without defining it........ The academic imperative of definition seems to be linked to the positivistic attempts – and produces sometimes monstrous definitions. Have they any philosophical value for our knowledge of what play is? Definition is not a universal instrument of knowledge-building, but a culturally specific construction...

  10. Nouns to Define Homophobia

    Directory of Open Access Journals (Sweden)

    Adalberto Campo Arias

    2013-09-01

    Full Text Available Background. The term ‘homophobia’ was introduced in the academic context more than 40 years ago. However, its meaning has changed over time. Objective. To review the nouns used in the last twelve years to define homophobia. Methodology. The authors conducted a systematic search in Medline through Pubmed that included editorials, letters to editors, comments and narrative reviews, in English and Spanish. A qualitative analysis (Grounded theory was applied to analyze nouns used to define homophobia since 2001 through 2012. Results. Authors reviewed three papers including ten nouns to define homophobia, the most common noun was fear. The terms were grouped into two domains: negative attitude and discomfort with homosexuality. Conclusion. Fear is the most used word to describe homophobia. The terms were grouped into two domains: negative attitude and discomfort toward homosexuality.

  11. Identifying hidden sexual bridging communities in Chicago.

    Science.gov (United States)

    Youm, Yoosik; Mackesy-Amiti, Mary Ellen; Williams, Chyvette T; Ouellet, Lawrence J

    2009-07-01

    Bridge populations can play a central role in the spread of human immunodeficiency virus (HIV) by providing transmission links between higher and lower prevalence populations. While social network methods are well suited to the study of bridge populations, analyses tend to focus on dyads (i.e., risk between drug and/or sex partners) and ignore bridges between distinct subpopulations. This study takes initial steps toward moving the analysis of sexual network linkages beyond individual and risk group levels to a community level in which Chicago's 77 community areas are examined as subpopulations for the purpose of identifying potential bridging communities. Of particular interest are "hidden" bridging communities; that is, areas with above-average levels of sexual ties with other areas but whose below-average AIDS prevalence may hide their potential importance for HIV prevention. Data for this analysis came from the first wave of recruiting at the Chicago Sexual Acquisition and Transmission of HIV Cooperative Agreement Program site. Between August 2005 through October 2006, respondent-driven sampling was used to recruit users of heroin, cocaine, or methamphetamine, men who have sex with men regardless of drug use, the sex partners of these two groups, and sex partners of the sex partners. In this cross-sectional study of the sexual transmission of HIV, participants completed a network-focused computer-assisted self-administered interview, which included questions about the geographic locations of sexual contacts with up to six recent partners. Bridging scores for each area were determined using a matrix representing Chicago's 77 community areas and were assessed using two measures: non-redundant ties and flow betweenness. Bridging measures and acquired immunodeficiency syndrome (AIDS) case prevalence rates were plotted for each community area on charts representing four conditions: below-average bridging and AIDS prevalence, below-average bridging and above

  12. Carelessness: A Hidden Doxa of Higher Education

    Science.gov (United States)

    Lynch, Kathleen

    2010-01-01

    This article explores the implications of new public sector "reforms" for the culture of higher education. It argues that a culture of carelessness, grounded in Cartesian rationalism, has been exacerbated by new managerialism. The article challenges a prevailing sociological assumption that the character of higher education culture is primarily…

  13. Defining "intermittent UVR exposure"

    DEFF Research Database (Denmark)

    Bodekær, Mette; Philipsen, Peter Alshede; Petersen, Bibi Øager;

    2016-01-01

    to define and quantify “intermittent UVR exposure” by an objective measure. Methods: A broad study population of adults and children had data collected during a summer period. Data were personal UVR dosimetry measurements, from which the number of “intermittent days” was derived, sun behaviour diaries.......001). The corresponding numbers for prediction of nevi and lentigo density by retrospective questionnaire data was lower (R2 = 0.11, R2 = 0.26, p defined objective measure of intermittent UVR exposure. This measure may provide a better prediction of solar skin damage and CMM...

  14. 41 CFR 60-3.9 - No assumption of validity.

    Science.gov (United States)

    2010-07-01

    ... 41 Public Contracts and Property Management 1 2010-07-01 2010-07-01 true No assumption of validity. 60-3.9 Section 60-3.9 Public Contracts and Property Management Other Provisions Relating to Public... 3-UNIFORM GUIDELINES ON EMPLOYEE SELECTION PROCEDURES (1978) General Principles § 60-3.9...

  15. Ontological, Epistemological and Methodological Assumptions: Qualitative versus Quantitative

    Science.gov (United States)

    Ahmed, Abdelhamid

    2008-01-01

    The review to follow is a comparative analysis of two studies conducted in the field of TESOL in Education published in "TESOL QUARTERLY." The aspects to be compared are as follows. First, a brief description of each study will be presented. Second, the ontological, epistemological and methodological assumptions underlying each study…

  16. "Touch Me, Like Me": Testing an Encounter Group Assumption

    Science.gov (United States)

    Boderman, Alvin; And Others

    1972-01-01

    An experiment to test an encounter group assumption that touching increases interpersonal attraction was conducted. College women were randomly assigned to a touch or no-touch condition. A comparison of total evaluation scores verified the hypothesis: subjects who touched the accomplice perceived her as a more attractive person than those who did…

  17. The Metatheoretical Assumptions of Literacy Engagement: A Preliminary Centennial History

    Science.gov (United States)

    Hruby, George G.; Burns, Leslie D.; Botzakis, Stergios; Groenke, Susan L.; Hall, Leigh A.; Laughter, Judson; Allington, Richard L.

    2016-01-01

    In this review of literacy education research in North America over the past century, the authors examined the historical succession of theoretical frameworks on students' active participation in their own literacy learning, and in particular the metatheoretical assumptions that justify those frameworks. The authors used "motivation" and…

  18. Woman's Moral Development in Search of Philosophical Assumptions.

    Science.gov (United States)

    Sichel, Betty A.

    1985-01-01

    Examined is Carol Gilligan's thesis that men and women use different moral languages to resolve moral dilemmas, i.e., women speak a language of caring and responsibility, and men speak a language of rights and justice. Her thesis is not grounded with adequate philosophical assumptions. (Author/RM)

  19. Questioning Engelhardt's assumptions in Bioethics and Secular Humanism.

    Science.gov (United States)

    Ahmadi Nasab Emran, Shahram

    2016-06-01

    In Bioethics and Secular Humanism: The Search for a Common Morality, Tristram Engelhardt examines various possibilities of finding common ground for moral discourse among people from different traditions and concludes their futility. In this paper I will argue that many of the assumptions on which Engelhardt bases his conclusion about the impossibility of a content-full secular bioethics are problematic. By starting with the notion of moral strangers, there is no possibility, by definition, for a content-full moral discourse among moral strangers. It means that there is circularity in starting the inquiry with a definition of moral strangers, which implies that they do not share enough moral background or commitment to an authority to allow for reaching a moral agreement, and concluding that content-full morality is impossible among moral strangers. I argue that assuming traditions as solid and immutable structures that insulate people across their boundaries is problematic. Another questionable assumption in Engelhardt's work is the idea that religious and philosophical traditions provide content-full moralities. As the cardinal assumption in Engelhardt's review of the various alternatives for a content-full moral discourse among moral strangers, I analyze his foundationalist account of moral reasoning and knowledge and indicate the possibility of other ways of moral knowledge, besides the foundationalist one. Then, I examine Engelhardt's view concerning the futility of attempts at justifying a content-full secular bioethics, and indicate how the assumptions have shaped Engelhardt's critique of the alternatives for the possibility of content-full secular bioethics.

  20. Deep Borehole Field Test Requirements and Controlled Assumptions.

    Energy Technology Data Exchange (ETDEWEB)

    Hardin, Ernest [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-07-01

    This document presents design requirements and controlled assumptions intended for use in the engineering development and testing of: 1) prototype packages for radioactive waste disposal in deep boreholes; 2) a waste package surface handling system; and 3) a subsurface system for emplacing and retrieving packages in deep boreholes. Engineering development and testing is being performed as part of the Deep Borehole Field Test (DBFT; SNL 2014a). This document presents parallel sets of requirements for a waste disposal system and for the DBFT, showing the close relationship. In addition to design, it will also inform planning for drilling, construction, and scientific characterization activities for the DBFT. The information presented here follows typical preparations for engineering design. It includes functional and operating requirements for handling and emplacement/retrieval equipment, waste package design and emplacement requirements, borehole construction requirements, sealing requirements, and performance criteria. Assumptions are included where they could impact engineering design. Design solutions are avoided in the requirements discussion. Deep Borehole Field Test Requirements and Controlled Assumptions July 21, 2015 iv ACKNOWLEDGEMENTS This set of requirements and assumptions has benefited greatly from reviews by Gordon Appel, Geoff Freeze, Kris Kuhlman, Bob MacKinnon, Steve Pye, David Sassani, Dave Sevougian, and Jiann Su.

  1. Using Contemporary Art to Challenge Cultural Values, Beliefs, and Assumptions

    Science.gov (United States)

    Knight, Wanda B.

    2006-01-01

    Art educators, like many other educators born or socialized within the main-stream culture of a society, seldom have an opportunity to identify, question, and challenge their cultural values, beliefs, assumptions, and perspectives because school culture typically reinforces those they learn at home and in their communities (Bush & Simmons, 1990).…

  2. Lightweight Graphical Models for Selectivity Estimation Without Independence Assumptions

    DEFF Research Database (Denmark)

    Tzoumas, Kostas; Deshpande, Amol; Jensen, Christian S.

    2011-01-01

    ’s optimizers are frequently caused by missed correlations between attributes. We present a selectivity estimation approach that does not make the independence assumptions. By carefully using concepts from the field of graphical models, we are able to factor the joint probability distribution of all...

  3. Making Predictions about Chemical Reactivity: Assumptions and Heuristics

    Science.gov (United States)

    Maeyer, Jenine; Talanquer, Vicente

    2013-01-01

    Diverse implicit cognitive elements seem to support but also constrain reasoning in different domains. Many of these cognitive constraints can be thought of as either implicit assumptions about the nature of things or reasoning heuristics for decision-making. In this study we applied this framework to investigate college students' understanding of…

  4. Unpacking Assumptions in Research Synthesis: A Critical Construct Synthesis Approach

    Science.gov (United States)

    Wolgemuth, Jennifer R.; Hicks, Tyler; Agosto, Vonzell

    2017-01-01

    Research syntheses in education, particularly meta-analyses and best-evidence syntheses, identify evidence-based practices by combining findings across studies whose constructs are similar enough to warrant comparison. Yet constructs come preloaded with social, historical, political, and cultural assumptions that anticipate how research problems…

  5. Challenging Teachers' Pedagogic Practice and Assumptions about Social Media

    Science.gov (United States)

    Cartner, Helen C.; Hallas, Julia L.

    2017-01-01

    This article describes an innovative approach to professional development designed to challenge teachers' pedagogic practice and assumptions about educational technologies such as social media. Developing effective technology-related professional development for teachers can be a challenge for institutions and facilitators who provide this…

  6. Assumptions regarding right censoring in the presence of left truncation.

    Science.gov (United States)

    Qian, Jing; Betensky, Rebecca A

    2014-04-01

    Clinical studies using complex sampling often involve both truncation and censoring, where there are options for the assumptions of independence of censoring and event and for the relationship between censoring and truncation. In this paper, we clarify these choices, show certain equivalences, and provide examples.

  7. DDH-like Assumptions Based on Extension Rings

    DEFF Research Database (Denmark)

    Cramer, Ronald; Damgård, Ivan Bjerre; Kiltz, Eike

    2011-01-01

    DDH, is easy in bilinear groups. This motivates our suggestion of a different type of assumption, the d-vector DDH problems (VDDH), which are based on f(X)= X^d, but with a twist to avoid the problems with reducible polynomials. We show in the generic group model that VDDH is hard in bilinear groups...

  8. Evaluation of the Effects of Hidden Node Problems in IEEE 802.15.7 Uplink Performance

    Directory of Open Access Journals (Sweden)

    Carlos Ley-Bosch

    2016-02-01

    Full Text Available In the last few years, the increasing use of LEDs in illumination systems has been conducted due to the emergence of Visible Light Communication (VLC technologies, in which data communication is performed by transmitting through the visible band of the electromagnetic spectrum. In 2011, the Institute of Electrical and Electronics Engineers (IEEE published the IEEE 802.15.7 standard for Wireless Personal Area Networks based on VLC. Due to limitations in the coverage of the transmitted signal, wireless networks can suffer from the hidden node problems, when there are nodes in the network whose transmissions are not detected by other nodes. This problem can cause an important degradation in communications when they are made by means of the Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA access control method, which is used in IEEE 802.15.7 This research work evaluates the effects of the hidden node problem in the performance of the IEEE 802.15.7 standard We implement a simulator and analyze VLC performance in terms of parameters like end-to-end goodput and message loss rate. As part of this research work, a solution to the hidden node problem is proposed, based on the use of idle patterns defined in the standard. Idle patterns are sent by the network coordinator node to communicate to the other nodes that there is an ongoing transmission. The validity of the proposed solution is demonstrated with simulation results.

  9. Identification of hidden failures in process control systems through function-oriented system analysis

    Energy Technology Data Exchange (ETDEWEB)

    Jalashgar, A.

    1997-05-01

    The main subject of this thesis is to identify hidden failures in process control systems by developing and using a function-oriented system analysis method. Qualitative failure analysis and the characteristics of the classical failure analysis methods and function-oriented modelling methods are covered. The general limitations of the methods in connection with the identification and representation of hidden failures are discussed. The discussion has led to the justification of developing and using a function-oriented system analysis method to identify and represent the capabilities of the system components, which realize different sets of functions in connection with different sets of goals that the system must achieve. A terminology is introduced to define the basic aspects of technical systems including goals, functions, capabilities and physical structure. A function-oriented system analysis method using this terminology and a tailored combination of the two function-oriented modelling approaches, is also introduced. It is then explained how the method can be applied in the identification and representation of hidden failures. The building blocks of a knowledge-oriented system to perform the diagnosis on the basis of the developed method are equally described. A prototype of the knowledge-based system is developed to demonstrate the applicability of the function-oriented system analysis method and the knowledge-based system. The prototype is implemented within the object-oriented software environment G2. (au) 65 ills., 32 refs.

  10. Evaluation of the Effects of Hidden Node Problems in IEEE 802.15.7 Uplink Performance.

    Science.gov (United States)

    Ley-Bosch, Carlos; Alonso-González, Itziar; Sánchez-Rodríguez, David; Ramírez-Casañas, Carlos

    2016-02-06

    In the last few years, the increasing use of LEDs in illumination systems has been conducted due to the emergence of Visible Light Communication (VLC) technologies, in which data communication is performed by transmitting through the visible band of the electromagnetic spectrum. In 2011, the Institute of Electrical and Electronics Engineers (IEEE) published the IEEE 802.15.7 standard for Wireless Personal Area Networks based on VLC. Due to limitations in the coverage of the transmitted signal, wireless networks can suffer from the hidden node problems, when there are nodes in the network whose transmissions are not detected by other nodes. This problem can cause an important degradation in communications when they are made by means of the Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) access control method, which is used in IEEE 802.15.7 This research work evaluates the effects of the hidden node problem in the performance of the IEEE 802.15.7 standard We implement a simulator and analyze VLC performance in terms of parameters like end-to-end goodput and message loss rate. As part of this research work, a solution to the hidden node problem is proposed, based on the use of idle patterns defined in the standard. Idle patterns are sent by the network coordinator node to communicate to the other nodes that there is an ongoing transmission. The validity of the proposed solution is demonstrated with simulation results.

  11. Multi-Level Steganography: Improving Hidden Communication in Networks

    CERN Document Server

    Fraczek, Wojciech; Szczypiorski, Krzysztof

    2011-01-01

    The paper presents Multi-Level Steganography (MLS), which defines a new concept for hidden communication. In MLS, at least two steganographic methods are utilised simultaneously, in such a way that one method (called the upper-level) serves as a carrier for the second one (called the lower-level). Such a relationship between two (or more) information hiding solutions has several potential benefits. The most important is that the lower-level method steganographic bandwidth can be utilised to make the steganogram unreadable even after the detection of the upper-level method: e.g., it can carry a cryptographic key that deciphers the steganogram carried by the upper-level one. It can also be used to provide the steganogram with integrity. Another important benefit is that the lower-layer method may be used as a signalling channel in which to exchange information that affects the way that the upper-level method functions, thus possibly making the steganographic communication harder to detect. MLS is presented in t...

  12. Quantum cryptography in real-life applications: Assumptions and security

    Science.gov (United States)

    Zhao, Yi

    Quantum cryptography, or quantum key distribution (QKD), provides a means of unconditionally secure communication. The security is in principle based on the fundamental laws of physics. Security proofs show that if quantum cryptography is appropriately implemented, even the most powerful eavesdropper cannot decrypt the message from a cipher. The implementations of quantum crypto-systems in real life may not fully comply with the assumptions made in the security proofs. Such discrepancy between the experiment and the theory can be fatal to the security of a QKD system. In this thesis we address a number of these discrepancies. A perfect single-photon source is often assumed in many security proofs. However, a weak coherent source is widely used in a real-life QKD implementation. Decoy state protocols have been proposed as a novel approach to dramatically improve the performance of a weak coherent source based QKD implementation without jeopardizing its security. Here, we present the first experimental demonstrations of decoy state protocols. Our experimental scheme was later adopted by most decoy state QKD implementations. In the security proof of decoy state protocols as well as many other QKD protocols, it is widely assumed that a sender generates a phase-randomized coherent state. This assumption has been enforced in few implementations. We close this gap in two steps: First, we implement and verify the phase randomization experimentally; second, we prove the security of a QKD implementation without the coherent state assumption. In many security proofs of QKD, it is assumed that all the detectors on the receiver's side have identical detection efficiencies. We show experimentally that this assumption may be violated in a commercial QKD implementation due to an eavesdropper's malicious manipulation. Moreover, we show that the eavesdropper can learn part of the final key shared by the legitimate users as a consequence of this violation of the assumptions.

  13. Magneto-Radar Hidden Metal Detector

    Energy Technology Data Exchange (ETDEWEB)

    McEwan, Thomas E. (Las Vegas, NV)

    2005-07-05

    A varying magnetic field excites slight vibrations in an object and a radar sensor detects the vibrations at a harmonic of the excitation frequency. The synergy of the magnetic excitation and radar detection provides increased detection range compared to conventional magnetic metal detectors. The radar rejects background clutter by responding only to reflecting objects that are vibrating at a harmonic excitation field, thereby significantly improving detection reliability. As an exemplary arrangement, an ultra-wideband micropower impulse radar (MIR) is capable of being employed to provide superior materials penetration while providing range information. The magneto-radar may be applied to pre-screening magnetic resonance imaging (MRI) patients, landmine detection and finding hidden treasures.

  14. Effect of Noise on hidden data

    Directory of Open Access Journals (Sweden)

    Garima Tomar

    2012-02-01

    Full Text Available This paper simulates an effective data hiding technique i.e. steganography based on LSB insertion and RSA encryption in order to provide seven million times better security than the previous work. The Main idea of proposed scheme is to encrypt secret data by RSA 1024 algorithm, convert it in to binary sequence bit and then embedded into each cover pixels by modifying the least significant bits (LSBs of cover pixels. The result image is also known as steganography image. The PSNR value of this steganography image is 54.34 db. In this paper Baboon image is used for experimental purpous.This steganography image is transmitted through AWGN channel, and performance is simulated. The image and hidden data are reconstructed with the SNR level ≥9 dB.

  15. Sending Hidden Data via Google Suggest

    CERN Document Server

    Bialczak, Piotr; Szczypiorski, Krzysztof

    2011-01-01

    Google Suggest is a service incorporated within Google Web Search which was created to help user find the right search phrase by proposing the autocompleting popular phrases while typing. The paper presents a new network steganography method called StegSuggest which utilizes suggestions generated by Google Suggest as a hidden data carrier. The detailed description of the method's idea is backed up with the analysis of the network traffic generated by the Google Suggest to prove its feasibility. The traffic analysis was also performed to discover the occurrence of two TCP options: Window Scale and Timestamp which StegSuggest uses to operate. Estimation of method steganographic bandwidth proves that it is possible to insert 100 bits of steganogram into every suggestions list sent by Google Suggest service.

  16. Grand unified hidden-sector dark matter

    Science.gov (United States)

    Lonsdale, Stephen J.; Volkas, Raymond R.

    2014-10-01

    We explore G×G unified theories with the visible and the hidden or dark sectors paired under a Z2 symmetry. Developing a system of "asymmetric symmetry breaking" we motivate such models on the basis of their ability to generate dark baryons that are confined with a mass scale just above that of the proton, as motivated by asymmetric dark matter. This difference is achieved from the distinct but related confinement scales that develop in unified theories that have the two factors of G spontaneously breaking in an asymmetric manner. We show how Higgs potentials that admit different gauge group breaking chains in each sector can be constructed, and demonstrate the capacity for generating different fermion mass scales. Lastly we discuss supersymmetric extensions of such schemes.

  17. Hidden caries’ challenge diagnosis: case report

    Directory of Open Access Journals (Sweden)

    Fernanda Mara de Paiva Bertoli

    2013-06-01

    Full Text Available Introduction: Hidden caries is a term used to describe occlusal dentine caries that is missed on a visual examination, but is large and demineralised enough to be detected by another exam for example, radiographs. Case report: This article reports a case of large dentine caries, which presented as to be a small pit-and-fissure carious lesion on the occlusal surface of the right mandibular permanent first molar in a 10-year-old girl. The treatment included root canal treatment and the sealing of the cavity with composite resin. Conclusion: Careful visual examination, with cleaning and drying of teeth, associated to bitewing radiographs may improve occlusal caries detection. Dentists should examine bitewing radiographs carefully for proximal caries and occlusal demineralization. Radiographs are an effective method of caries diagnosis that can avoid large destruction and allows less invasive treatment.

  18. Hidden expectations within the Danish VET system

    DEFF Research Database (Denmark)

    Hjort-Madsen, Peder

    Researching the pressing retention and dropout problems of the Danish VET system (app. 20 pct. of a year group never achieve an upper secondary education) this paper takes its point of departure in the hypothesis that low performing students are kept in a marginal position (at the risk of dropping...... out) within the VET system, because of hidden expectations related to e.g. individualized responsibility, a certain student behavior (sitting still, participating actively), etc. By approaching the VET system as a cultural context (cultural praxis) the subtle reproductive mechanisms of the VET system...... are shown. With empirical examples from different introductory VET courses, it is shown how the school, the teachers and the students themselves are reproducing poor school performance and student background – being it gendered, ethnical or social – and hereby proving to the students, that school...

  19. Hidden expectations within the Danish VET system

    DEFF Research Database (Denmark)

    Hjort-Madsen, Peder

    2011-01-01

    Researching the pressing retention and dropout problems of the Danish VET system (app. 20 pct. of a year group never achieve an upper secondary education) this paper takes its point of departure in the hypothesis that low performing students are kept in a marginal position (at the risk of dropping...... out) within the VET system, because of hidden expectations related to e.g. individualized responsibility, a certain student behavior (sitting still, participating actively), etc. By approaching the VET system as a cultural context (cultural praxis) the subtle reproductive mechanisms of the VET system...... are shown. With empirical examples from different introductory VET courses, it is shown how the school, the teachers and the students themselves are reproducing poor school performance and student background – being it gendered, ethnical or social – and hereby proving to the students, that school...

  20. Nuclear scissors modes and hidden angular momenta

    CERN Document Server

    Balbutsev, E B; Schuck, P

    2016-01-01

    The coupled dynamics of low lying modes and various giant resonances are studied with the help of the Wigner Function Moments method generalized to take into account spin degrees of freedom and pair correlations simultaneously. The method is based on Time Dependent Hartree-Fock-Bogoliubov equations. The model of the harmonic oscillator including spin-orbit potential plus quadrupole-quadrupole and spin-spin interactions is considered. New low lying spin dependent modes are analyzed. Special attention is paid to the scissors modes. A new source of nuclear magnetism, connected with counter-rotation of spins up and down around the symmetry axis (hidden angular momenta), is discovered. Its inclusion into the theory allows one to improve substantially the agreement with experimental data in the description of energies and transition probabilities of scissors modes.

  1. Hidden expectations within the Danish VET system

    DEFF Research Database (Denmark)

    Hjort-Madsen, Peder

    2011-01-01

    out) within the VET system, because of hidden expectations related to e.g. individualized responsibility, a certain student behavior (sitting still, participating actively), etc. By approaching the VET system as a cultural context (cultural praxis) the subtle reproductive mechanisms of the VET system...... are shown. With empirical examples from different introductory VET courses, it is shown how the school, the teachers and the students themselves are reproducing poor school performance and student background – being it gendered, ethnical or social – and hereby proving to the students, that school......Researching the pressing retention and dropout problems of the Danish VET system (app. 20 pct. of a year group never achieve an upper secondary education) this paper takes its point of departure in the hypothesis that low performing students are kept in a marginal position (at the risk of dropping...

  2. Hidden baryons: The physics of Compton composites

    Science.gov (United States)

    Mayer, Frederick J.

    2016-06-01

    A large fraction of the mass-energy of the Universe appears to be composed of Compton composites. How is it then that these composites are not frequently observed in experiments? This paper addresses this question, and others, by reviewing recent publications that: 1) introduced Compton composites, 2) showed how and where they are formed and 3) explained how they interact with other systems. Though ubiquitous in many physical situations, Compton composites are almost completely hidden in experiments due to their unique interaction characteristics. Still, their presence has been indirectly observed, though not interpreted as such until recently. Looking to the future, direct-detection experiments are proposed that could verify the composites' components. It is with deep sadness that I dedicate this paper to my mentor, collaborator, and friend, Dr. John R. Reitz, who passed away within days of the publication of our paper “Compton Composites Late in the Early Universe”.

  3. Hidden realities inside PBL design processes

    DEFF Research Database (Denmark)

    Pihl, Ole Verner

    2015-01-01

    Design Process, but is a group-based architecture and design education better than that which is individually based? How does PBL affect space, form, and creative processes? Hans Kiib, professor and one of the founders of the Department of Architecture and Design in Aalborg, describes his intentions...... within the group work, as it is closer related to the actual PBL process”. Is the Integrated Design Process (Knudstrup 2004) and is Colb (1975) still current and valid? Can we still use these methodologies when we must create “learning for an unknown future,” as Ronald Barnett (2004) claims that we...... investigates the creative processes of the collective and the individual and clarifies some of the hidden realities behind the PBL-based creative processes, both through an inquiry with the students and a more methodological and theoretical approach. The paper also explores how to integrate artistic...

  4. Aluminium Diphosphamethanides: Hidden Frustrated Lewis Pairs.

    Science.gov (United States)

    Styra, Steffen; Radius, Michael; Moos, Eric; Bihlmeier, Angela; Breher, Frank

    2016-07-04

    The synthesis and characterisation of two aluminium diphosphamethanide complexes, [Al(tBu)2 {κ(2) P,P'-Mes*PCHPMes*}] (3) and [Al(C6 F5 )2 {κ(2) P,P'-Mes*PCHPMes*}] (4), and the silylated analogue, Mes*PCHP(SiMe3 )Mes* (5), are reported. The aluminium complexes feature four-membered PCPAl core structures consisting of diphosphaallyl ligands. The silylated phosphine 5 was found to be a valuable precursor for the synthesis of 4 as it cleanly reacts with the diaryl aluminium chloride [(C6 F5 )2 AlCl]2 . The aluminium complex 3 reacts with molecular dihydrogen at room temperature under formation of the acyclic σ(2) λ(3) ,σ(3) λ(3) -diphosphine Mes*PCHP(H)Mes* and the corresponding dialkyl aluminium hydride [tBu2 AlH]3 . Thus, 3 belongs to the family of so-called hidden frustrated Lewis pairs.

  5. Wavelet domain hidden markovian bayesian document segmentation

    Institute of Scientific and Technical Information of China (English)

    Sun Junxi; Xiao Changyan; Zhang Su; Chen Yazhu

    2005-01-01

    A novel algorithm for Bayesian document segmentation is proposed based on the wavelet domain hidden Markov tree (HMT) model. Once the parameters of model are known, according to the sequential maximum a posterior probability (SMAP) rule, firstly, the likelihood probability of HMT model for each pattern is computed from fine to coarse procedure. Then, the interscale state transition probability is solved using Expectation Maximum (EM) algorithm based on hybrid-quadtree and multiscale context information is fused from coarse to fine procedure. In order to get pixellevel segmentation, the redundant wavelet domain Gaussian mixture model (GMM) is employed to formulate pixel-level statistical property. The experiment results show that the proposed scheme is feasible and robust.

  6. Hidden fungi, emergent properties: endophytes and microbiomes.

    Science.gov (United States)

    Porras-Alfaro, Andrea; Bayman, Paul

    2011-01-01

    Endophytes are microorganisms that live within plant tissues without causing symptoms of disease. They are important components of plant microbiomes. Endophytes interact with, and overlap in function with, other core microbial groups that colonize plant tissues, e.g., mycorrhizal fungi, pathogens, epiphytes, and saprotrophs. Some fungal endophytes affect plant growth and plant responses to pathogens, herbivores, and environmental change; others produce useful or interesting secondary metabolites. Here, we focus on new techniques and approaches that can provide an integrative understanding of the role of fungal endophytes in the plant microbiome. Clavicipitaceous endophytes of grasses are not considered because they have unique properties distinct from other endophytes. Hidden from view and often overlooked, endophytes are emerging as their diversity, importance for plant growth and survival, and interactions with other organisms are revealed.

  7. A New Hidden Web Crawling Approach

    Directory of Open Access Journals (Sweden)

    L.Saoudi

    2015-10-01

    Full Text Available Traditional search engines deal with the Surface Web which is a set of Web pages directly accessible through hyperlinks and ignores a large part of the Web called hidden Web which is a great amount of valuable information of online database which is “hidden” behind the query forms. To access to those information the crawler have to fill the forms with a valid data, for this reason we propose a new approach which use SQLI technique in order to find the most promising keywords of a specific domain for automatic form submission. The effectiveness of proposed framework has been evaluated through experiments using real web sites and encouraging preliminary results were obtained

  8. Identifying Exotic Hidden-Charm Pentaquarks.

    Science.gov (United States)

    Chen, Rui; Liu, Xiang; Li, Xue-Qian; Zhu, Shi-Lin

    2015-09-25

    The LHCb Collaboration at the Large Hadron Collider at CERN discovered two pentaquark states P_{c}(4380) and P_{c}(4450). These two hidden-charm states are interpreted as the loosely bound Σ_{c}(2455)D^{*} and Σ_{c}^{*}(2520)D^{*} molecular states in the boson exchange interaction model, which provides an explanation for why the experimental width of P_{c}(4450) is much narrower than that of P_{c}(4380). The discovery of the new resonances P_{c}(4380) and P_{c}(4450), indeed, opens a new page for hadron physics. The partners of P_{c}(4380) and P_{c}(4450) should be pursued in future experiments.

  9. On Defining Mass

    Science.gov (United States)

    Hecht, Eugene

    2011-01-01

    Though central to any pedagogical development of physics, the concept of mass is still not well understood. Properly defining mass has proven to be far more daunting than contemporary textbooks would have us believe. And yet today the origin of mass is one of the most aggressively pursued areas of research in all of physics. Much of the excitement…

  10. Defining Data Science

    OpenAIRE

    Zhu, Yangyong; Xiong, Yun

    2015-01-01

    Data science is gaining more and more and widespread attention, but no consensus viewpoint on what data science is has emerged. As a new science, its objects of study and scientific issues should not be covered by established sciences. Data in cyberspace have formed what we call datanature. In the present paper, data science is defined as the science of exploring datanature.

  11. Defining Mathematical Giftedness

    Science.gov (United States)

    Parish, Linda

    2014-01-01

    This theoretical paper outlines the process of defining "mathematical giftedness" for a present study on how primary school teaching shapes the mindsets of children who are mathematically gifted. Mathematical giftedness is not a badge of honour or some special value attributed to a child who has achieved something exceptional.…

  12. Software Defined Networking

    DEFF Research Database (Denmark)

    Caba, Cosmin Marius

    resources are limited. Hence, to counteract this trend, current QoS mechanisms must become simpler to deploy and operate, in order to motivate NSPs to employ QoS techniques instead of overprovisioning. Software Defined Networking (SDN) represents a paradigm shift in the way telecommunication and data...

  13. Defining Effective Teaching

    Science.gov (United States)

    Layne, L.

    2012-01-01

    The author looks at the meaning of specific terminology commonly used in student surveys: "effective teaching." The research seeks to determine if there is a difference in how "effective teaching" is defined by those taking student surveys and those interpreting the results. To investigate this difference, a sample group of professors and students…

  14. Defining Game Mechanics

    DEFF Research Database (Denmark)

    Sicart (Vila), Miguel Angel

    2008-01-01

    This article defins game mechanics in relation to rules and challenges. Game mechanics are methods invoked by agents for interacting with the game world. I apply this definition to a comparative analysis of the games Rez, Every Extend Extra and Shadow of the Colossus that will show the relevance...... of a formal definition of game mechanics. Udgivelsesdato: Dec 2008...

  15. Software Defined Cyberinfrastructure

    Energy Technology Data Exchange (ETDEWEB)

    Foster, Ian; Blaiszik, Ben; Chard, Kyle; Chard, Ryan

    2017-07-17

    Within and across thousands of science labs, researchers and students struggle to manage data produced in experiments, simulations, and analyses. Largely manual research data lifecycle management processes mean that much time is wasted, research results are often irreproducible, and data sharing and reuse remain rare. In response, we propose a new approach to data lifecycle management in which researchers are empowered to define the actions to be performed at individual storage systems when data are created or modified: actions such as analysis, transformation, copying, and publication. We term this approach software-defined cyberinfrastructure because users can implement powerful data management policies by deploying rules to local storage systems, much as software-defined networking allows users to configure networks by deploying rules to switches.We argue that this approach can enable a new class of responsive distributed storage infrastructure that will accelerate research innovation by allowing any researcher to associate data workflows with data sources, whether local or remote, for such purposes as data ingest, characterization, indexing, and sharing. We report on early experiments with this approach in the context of experimental science, in which a simple if-trigger-then-action (IFTA) notation is used to define rules.

  16. Defining in Classroom Activities.

    Science.gov (United States)

    Mariotti, Maria Alessandra; Fischbein, Efraim

    1997-01-01

    Discusses some aspects of the defining process in geometrical context in the reference frame of the theory of "figural concepts." Presents analysis of some examples taken from a teaching experiment at the sixth-grade level. Contains 30 references. (Author/ASK)

  17. Defining Game Mechanics

    DEFF Research Database (Denmark)

    Sicart (Vila), Miguel Angel

    2008-01-01

    This article defins game mechanics in relation to rules and challenges. Game mechanics are methods invoked by agents for interacting with the game world. I apply this definition to a comparative analysis of the games Rez, Every Extend Extra and Shadow of the Colossus that will show the relevance...... of a formal definition of game mechanics. Udgivelsesdato: Dec 2008...

  18. On a Search for Hidden Photon CDM by a Multicathode Counter

    Directory of Open Access Journals (Sweden)

    A. V. Kopylov

    2016-01-01

    Full Text Available We report a new technique of a multicathode counter (MCC developed to search for hidden photon (HP cold dark matter (CDM with a mass from 5 to 500 eV. The method is suggested in the assumption that HP-photon mixing causes emission of single electrons from a metal cathode if the mass of hidden photon mγ′ is greater than a work function of the metal φW. The measured effect from HP should be dependent on φW and on the structure of electronic shells of the metal used as a cathode. Potentially this can be used for a verification of the results obtained. Some preliminary results for the upper limit for mixing parameter χ have been obtained for HP with a mass from 5 eV to 10 keV as a pure illustration of the potential of this technique. The efforts are continued to refine the procedure of data treatment and to improve the work of MCC. A new detector with a more developed design is under construction.

  19. Hidden Photon Compton and Bremsstrahlung in White Dwarf Anomalous Cooling and Luminosity Functions

    CERN Document Server

    Chang, Chia-Feng

    2016-01-01

    We computed the contribution of the Compton and Bremsstrahlung processes with a hidden light $U(1)_D$ neutral boson $\\gamma_D$ to the white dwarf G117-B15A anomalous cooling rate, as well as the white dwarf luminosity functions (WDLF). We demonstrated that for a light mass of hidden photon ($m_{\\gamma_D} \\ll$ a few keV), compatible results are obtained for the recent Sloan Digital Sky Survey and the SuperCOSMOS Sky Survey observation, but the stringent limits would be imposed on the kinetic mixing $\\epsilon$. We performed $\\chi^2$-tests to acquire a quantitative assessment on the WDLF data in the context of our model, computed under the assumption of different kinetic mixing $\\epsilon$, the age of the oldest computed stars $T_D$, and a constant star formation rate $\\psi$. Then taken together, the WDLF analysis of 2$\\sigma$ confidence interval $\\epsilon = \\left( 0.37^{+0.35}_{-0.37}\\right) \\times 10^{-14}$ is barely consistent with the cooling rate analysis at 2$\\sigma$ regime $\\epsilon = \\left( 0.97^{+0.35}_{...

  20. On a Search for Hidden Photon CDM by a Multi-Cathode Counter

    CERN Document Server

    Kopylov, A V; Petukhov, V V

    2016-01-01

    We report on a new technique of a Multi-Cathode Counter (MCC) developed to search for hidden photon (HP) cold dark matter (CDM) with a mass from 5 to 500 eV. The method is suggested in the assumption that HP-photon mixing causes emission of single electrons from a metal cathode if the mass of hidden photon is greater than a work function of the metal. The measured effect from HP should be dependent on work function of the metal and on the structure of electronic shells of the metal used as a cathode. Potentially this can be used for a verification of the results obtained. Some preliminary results for the upper limit for mixing parameter X have been obtained for HP with a mass from 5 eV to 10 keV as a pure illustration of the potential of this technique. The efforts are continued to refine the procedure of data treatment and to improve the work of MCC. A new detector with a more developed design is under construction.

  1. Analyzing development of working models for disrupted attachments: the case of hidden family violence.

    Science.gov (United States)

    Ayoub, Catherine C; Fischer, Kurt W; O'Connor, Erin E

    2003-06-01

    This article offers a developmental model of attachment theory rooted in dynamic skill theory. Dynamic skill theory is based on the assumption that people do not have integrated, fundamentally logical minds, but instead develop along naturally fractionated strands of a web. Contrary to traditional interpretations of attachment theory, dynamic skill theory proposes that individuals continue to modify their working models of attachments throughout the lifespan. In particular, working models of close relationships develop systematically through a series of skill levels such that the skills vary across strands in the web and will not automatically form a unified whole. The continual modification of working models is particularly pertinent for the consequences of hidden family violence for individuals' development. Dynamic skill theory shows how trauma can produce not developmental delay or fixation, as has been proposed previously, but instead the construction of advanced, complex working models.

  2. Exploring the Hidden Barriers in Knowledge Translation: A Case Study Within an Academic Community.

    Science.gov (United States)

    Harvey, Gill; Marshall, Rhianon J; Jordan, Zoe; Kitson, Alison L

    2015-11-01

    Debates about knowledge translation (KT) typically focus on the research-practice gap, which appears to be premised on the assumption that academics are a homogeneous collective, sharing a common view. We argue that a number of hidden barriers need to be addressed related to the understanding, interpretation, ability, and commitment to translate knowledge within academic communities. We explore this by presenting a qualitative case study in a health sciences faculty. Applying organizational and management theory, we discuss different types of boundaries and the resultant barriers generated, ranging from diversity in understanding and perceptions of KT to varying motivations and incentives to engage in translational activity. We illustrate how we are using the empirical findings to inform the development of a KT strategy that targets the identified barriers. Investing in this internal KT-focused activity is an important step to maximize the potential of future collaborations between producers and users of research in health care. © The Author(s) 2015.

  3. Projected and Hidden Markov Models for calculating kinetics and metastable states of complex molecules

    CERN Document Server

    Noe, Frank; Prinz, Jan-Hendrik; Plattner, Nuria

    2013-01-01

    Markov state models (MSMs) have been successful in computing metastable states, slow relaxation timescales and associated structural changes, and stationary or kinetic experimental observables of complex molecules from large amounts of molecular dynamics simulation data. However, MSMs approximate the true dynamics by assuming a Markov chain on a clusters discretization of the state space. This approximation is difficult to make for high-dimensional biomolecular systems, and the quality and reproducibility of MSMs has therefore been limited. Here, we discard the assumption that dynamics are Markovian on the discrete clusters. Instead, we only assume that the full phase- space molecular dynamics is Markovian, and a projection of this full dynamics is observed on the discrete states, leading to the concept of Projected Markov Models (PMMs). Robust estimation methods for PMMs are not yet available, but we derive a practically feasible approximation via Hidden Markov Models (HMMs). It is shown how various molecula...

  4. On the Empirical Importance of the Conditional Skewness Assumption in Modelling the Relationship between Risk and Return

    Science.gov (United States)

    Pipień, M.

    2008-09-01

    We present the results of an application of Bayesian inference in testing the relation between risk and return on the financial instruments. On the basis of the Intertemporal Capital Asset Pricing Model, proposed by Merton we built a general sampling distribution suitable in analysing this relationship. The most important feature of our assumptions is that the skewness of the conditional distribution of returns is used as an alternative source of relation between risk and return. This general specification relates to Skewed Generalized Autoregressive Conditionally Heteroscedastic-in-Mean model. In order to make conditional distribution of financial returns skewed we considered the unified approach based on the inverse probability integral transformation. In particular, we applied hidden truncation mechanism, inverse scale factors, order statistics concept, Beta and Bernstein distribution transformations and also a constructive method. Based on the daily excess returns on the Warsaw Stock Exchange Index we checked the empirical importance of the conditional skewness assumption on the relation between risk and return on the Warsaw Stock Market. We present posterior probabilities of all competing specifications as well as the posterior analysis of the positive sign of the tested relationship.

  5. Using HPGe detector for a solar hidden-photons search

    CERN Document Server

    Horvat, R; Krcmar, M; Krecak, Z; Ljubicic, A

    2012-01-01

    In this paper we report on the results of our search for photons from a U(1) gauge factor in the hidden sector of the full theory, by observing the single spectrum in a HPGe detector arising as a result of the photoelectric-like absorption of hidden photons emitted from the Sun on germanium atoms inside the detector. The main ingredient of the theory used in our analysis, a severely constrained kinetic mixing from the two U(1) gauge factors and massive hidden photons, leads to both photon into hidden states oscillations and to a minuscule coupling of hidden photons to visible matter, of which the latter our experimental setup has been designed to observe. On a theoretical side, full account was taken of the effects of refraction and damping of photons while propagating in the Sun's interior. We exclude hidden photons with kinetic couplings chi > (1.5x10^{-6}-2.6x10^{-11}) for the mass region 1.7x10^{-4} eV < m_\\gamma' < 3.4 eV. Our constraints on the mixing parameter chi at sub-eV hidden-photon masses p...

  6. Spinon excitations in the spin-1 XXZ chain and hidden supersymmetry

    CERN Document Server

    Matsui, Chihiro

    2016-01-01

    We study spinon excitations of the integrable spin-1 (Fateev-Zamolodchikov; FZ) chain and their relation to the hidden supersymmetry. Using the notion of the supercharges earlier introduced to the spin chains, which change the system length by one, we found that they nontrivially act on one of two kinds of the degrees of freedom for the FZ chain. Their actions were obtained to be the same as those of the supercharges defined on the supersymmetric sine-Gordon model, the low-energy effective field theory of the FZ chain. Moreover, we construct the eigenstates which are invariant under the supersymmetric Hamiltonian given as the anti-commutator of the supercharges.

  7. Defining the fascial system.

    Science.gov (United States)

    Adstrum, Sue; Hedley, Gil; Schleip, Robert; Stecco, Carla; Yucesoy, Can A

    2017-01-01

    Fascia is a widely used yet indistinctly defined anatomical term that is concurrently applied to the description of soft collagenous connective tissue, distinct sections of membranous tissue, and a body pervading soft connective tissue system. Inconsistent use of this term is causing concern due to its potential to confuse technical communication about fascia in global, multiple discipline- and multiple profession-spanning discourse environments. The Fascia Research Society acted to address this issue by establishing a Fascia Nomenclature Committee (FNC) whose purpose was to clarify the terminology relating to fascia. This committee has since developed and defined the terms a fascia, and, more recently, the fascial system. This article reports on the FNC's proposed definition of the fascial system. Copyright © 2016 Elsevier Ltd. All rights reserved.

  8. Defining Legal Moralism

    DEFF Research Database (Denmark)

    Thaysen, Jens Damgaard

    2015-01-01

    This paper discusses how legal moralism should be defined. It is argued that legal moralism should be defined as the position that “For any X, it is always a pro tanto reason for justifiably imposing legal regulation on X that X is morally wrong (where “morally wrong” is not conceptually equivalent...... to “harmful”)”. Furthermore, a distinction between six types of legal moralism is made. The six types are grouped according to whether they are concerned with the enforcement of positive or critical morality, and whether they are concerned with criminalising, legally restricting, or refraining from legally...... protecting morally wrong behaviour. This is interesting because not all types of legal moralism are equally vulnerable to the different critiques of legal moralism that have been put forth. Indeed, I show that some interesting types of legal moralism have not been criticised at all....

  9. Define Digital Vernacular

    Institute of Scientific and Technical Information of China (English)

    刘佳; 李海英; James Stevens; Rough Nelson

    2014-01-01

    As science and technology developed, the tools of humans developed from humans’hands, to mechanical and digital technologies. The tools influ-ence almost everything in the humans’world, so does vernacular. The digital vernacular could be understood as using digital technology to vernacular; the digital means technologies. It also could be understood as doing vernacular in a digital way;the digital means data and information, in other words it can be seeking truth from facts. Define digital vernacular is not only what is digital vernacular, but also about how to do the digital vernacular and what kind of attitude we should hold to-ward the digital vernacular. Define digital vernacular as both thinking and doing.

  10. Defining local food

    DEFF Research Database (Denmark)

    Eriksen, Safania Normann

    2013-01-01

    Despite evolving local food research, there is no consistent definition of “local food.” Various understandings are utilized, which have resulted in a diverse landscape of meaning. The main purpose of this paper is to examine how researchers within the local food systems literature define local...... food, and how these definitions can be used as a starting point to identify a new taxonomy of local food based on three domains of proximity....

  11. [To define internet addiction].

    Science.gov (United States)

    Tonioni, Federico

    2013-01-01

    Internet addiction is a new behavioral disorder difficult to define, especially when referring to young teenagers who make great use of web-mediated relationships. It's necessary to separate the cases of overt dependency on those in which the abuse of internet seems to have a different value, offering the only way to achieve the possible relationship. Internet is mediating a new way of communicating and thinking, this may favor the onset of clinical phenomena intended to surprise.

  12. Decidability of definability

    CERN Document Server

    Tsankov, Manuel Bodirsky; Michael Pinsker; Todor

    2010-01-01

    For a fixed infinite structure $\\Gamma$ with finite signature $\\tau$, we study the following computational problem: Input are quantifier-free first-order $\\tau$-formulas $\\phi_0,\\phi_1,\\dots,\\phi_n$ that define relations $R_0,R_1,\\dots,R_n$ over $\\Gamma$. The question is whether the relation $R_0$ is primitive positive definable from $R_1,\\ldots,R_n$, i.e., definable by a first-order formula that uses only relation symbols for $R_1, \\dots, R_n$, equality, conjunctions, and existential quantification (disjunction, negation, and universal quantification are forbidden). We show decidability of this problem for all structures $\\Gamma$ that have a first-order definition in an ordered homogeneous structure $\\Delta$ with a finite language whose age is a Ramsey class and determined by finitely many forbidden substructures. Examples for structures $\\Gamma$ with this property are the order of the rationals, the random graph, the homogeneous universal poset, the random tournament, all homogeneous universal $C$-relations...

  13. Hidden photon dark matter search with large metallic mirror

    Energy Technology Data Exchange (ETDEWEB)

    Doebrich, Babette; Lindner, Axel [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Daumiller, Kai; Engel, Ralph; Roth, Markus [Karlsruher Institut fuer Technologie (KIT), Karlsruhe (Germany); Kowalski, Marek [Deutsches Elektronen-Synchrotron (DESY), Zeuthen (Germany); Humboldt-Universitaet, Berlin (Germany). Inst. fuer Physik; Redondo, Javier [Zaragoza Univ. (Spain)

    2014-10-15

    If Dark Matter is composed of hidden-sector photons that kinetically mix with photons of the visible sector, then Dark Matter has a tiny oscillating electric field component. Its presence would lead to a small amount of visible radiation being emitted from a conducting surface, with the photon frequency given approximately by the mass of the hidden photon. Here, we report on experimental efforts that have started recently to search for such hidden photon Dark Matter in the (sub-)eV regime with a prototype mirror for the Auger fluorescence detector at the Karlsruhe Institute for Technology.

  14. Suppressing the QCD axion abundance by hidden monopoles

    Energy Technology Data Exchange (ETDEWEB)

    Kawasaki, Masahiro [Tokyo Univ., Chiba (Japan). Inst. for Cosmic Ray Research; Tokyo Univ., Chiba (Japan). Kavli IPMU (WPI), UTIAS; Takahashi, Fuminobu [Tokyo Univ., Miyagi (Japan). Dept. of Physics; Tokyo Univ., Chiba (Japan). Kavli IPMU (WPI), UTIAS; Yamada, Masaki [Tokyo Univ., Chiba (Japan). Inst. for Cosmic Ray Research; Tokyo Univ., Chiba (Japan). Kavli IPMU (WPI), UTIAS; DESY Hamburg (Germany)

    2015-11-15

    We study the Witten effect of hidden monopoles on the QCD axion dynamics, and show that its abundance as well as isocurvature perturbations can be significantly suppressed if there is a sufficient amount of hidden monopoles. When the hidden monopoles make up a significant fraction of dark matter, the Witten effect suppresses the abundance of axion with the decay constant smaller than 10{sup 12} GeV. The cosmological domain wall problem of the QCD axion can also be avoided, relaxing the upper bound on the decay constant when the Peccei-Quinn symmetry is spontaneously broken after inflation.

  15. Suppressing the QCD axion abundance by hidden monopoles

    Directory of Open Access Journals (Sweden)

    Masahiro Kawasaki

    2016-02-01

    Full Text Available We study the Witten effect of hidden monopoles on the QCD axion dynamics, and show that its abundance as well as isocurvature perturbations can be significantly suppressed if there is a sufficient amount of hidden monopoles. When the hidden monopoles make up a significant fraction of dark matter, the Witten effect suppresses the abundance of axion with the decay constant smaller than 1012GeV. The cosmological domain wall problem of the QCD axion can also be avoided, relaxing the upper bound on the decay constant when the Peccei–Quinn symmetry is spontaneously broken after inflation.

  16. Naturally light hidden photons in LARGE volume string compactifications

    Energy Technology Data Exchange (ETDEWEB)

    Goodsell, M. [LPTHE, Univ. Pierre et Marie Curie, Paris (France); Jaeckel, J. [Inst. for Particle Physics Phenomenology, Univ. Durham (United Kingdom); Redondo, J.; Ringwald, A. [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany)

    2009-09-15

    Extra ''hidden'' U(1) gauge factors are a generic feature of string theory that is of particular phenomenological interest. They can kinetically mix with the Standard Model photon and are thereby accessible to a wide variety of astrophysical and cosmological observations and laboratory experiments. In this paper we investigate the masses and the kinetic mixing of hidden U(1)s in LARGE volume compactifications of string theory. We find that in these scenarios the hidden photons can be naturally light and that their kinetic mixing with the ordinary electromagnetic photon can be of a size interesting for near future experiments and observations. (orig.)

  17. Hidden SUSY from precision gauge unification

    Energy Technology Data Exchange (ETDEWEB)

    Krippendorf, Sven; Nilles, Hans Peter [Bonn Univ. (Germany). Bethe Center for Theoretical Physics; Bonn Univ. (Germany). Physikalisches Inst.; Ratz, Michael [Technische Univ. Muenchen, Garching (Germany). Physik-Department; Winkler, Martin Wolfgang [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany)

    2013-06-15

    We revisit the implications of naturalness and gauge unification in the MSSM. We find that precision unification of the couplings in connection with a small {mu} parameter requires a highly compressed gaugino pattern as it is realized in mirage mediation. Due to the small mass difference between gluino and LSP, collider limits on the gluino mass are drastically relaxed. Without further assumptions, the relic density of the LSP is very close to the observed dark matter density due to coannihilation effects.

  18. Analysis of one assumption of the Navier-Stokes equations

    CERN Document Server

    Budarin, V A

    2013-01-01

    This article analyses the assumptions regarding the influence of pressure forces during the calculation of the motion of a Newtonian fluid. The purpose of the analysis is to determine the reasonableness of the assumptions and their impact on the results of the analytical calculation. The connections between equations, causes of discrepancies in exact solutions of the Navier-Stokes equations at low Reynolds numbers and the emergence of unstable solutions using computer programs are also addressed. The necessity to complement the well-known equations of motion in mechanical stress requires other equations are substantive. It is shown that there are three methods of solving such a problem and the requirements for the unknown equations are described. Keywords: Navier-Stokes, approximate equation, closing equations, holonomic system.

  19. Testing Modeling Assumptions in the West Africa Ebola Outbreak

    Science.gov (United States)

    Burghardt, Keith; Verzijl, Christopher; Huang, Junming; Ingram, Matthew; Song, Binyang; Hasne, Marie-Pierre

    2016-01-01

    The Ebola virus in West Africa has infected almost 30,000 and killed over 11,000 people. Recent models of Ebola Virus Disease (EVD) have often made assumptions about how the disease spreads, such as uniform transmissibility and homogeneous mixing within a population. In this paper, we test whether these assumptions are necessarily correct, and offer simple solutions that may improve disease model accuracy. First, we use data and models of West African migration to show that EVD does not homogeneously mix, but spreads in a predictable manner. Next, we estimate the initial growth rate of EVD within country administrative divisions and find that it significantly decreases with population density. Finally, we test whether EVD strains have uniform transmissibility through a novel statistical test, and find that certain strains appear more often than expected by chance. PMID:27721505

  20. The sufficiency assumption of the reasoned approach to action

    Directory of Open Access Journals (Sweden)

    David Trafimow

    2015-12-01

    Full Text Available The reasoned action approach to understanding and predicting behavior includes the sufficiency assumption. Although variables not included in the theory may influence behavior, these variables work through the variables in the theory. Once the reasoned action variables are included in an analysis, the inclusion of other variables will not increase the variance accounted for in behavioral intentions or behavior. Reasoned action researchers are very concerned with testing if new variables account for variance (or how much traditional variables account for variance, to see whether they are important, in general or with respect to specific behaviors under investigation. But this approach tacitly assumes that accounting for variance is highly relevant to understanding the production of variance, which is what really is at issue. Based on the variance law, I question this assumption.

  1. A "unity assumption" does not promote intersensory integration.

    Science.gov (United States)

    Misceo, Giovanni F; Taylor, Nathanael J

    2011-01-01

    An account of intersensory integration is premised on knowing that different sensory inputs arise from the same object. Could, however, the combination of the inputs be impaired although the "unity assumption" holds? Forty observers viewed a square through a minifying (50%) lens while they simultaneously touched the square. Half could see and half could not see their haptic explorations of the square. Both groups, however, had reason to believe that they were touching and viewing the same square. Subsequent matches of the inspected square were mutually biased by touch and vision when the exploratory movements were visible. However, the matches were biased in the direction of the square's haptic size when observers could not see their exploratory movements. This impaired integration without the visible haptic explorations suggests that the unity assumption alone is not enough to promote intersensory integration.

  2. Models for waste life cycle assessment: Review of technical assumptions

    DEFF Research Database (Denmark)

    Gentil, Emmanuel; Damgaard, Anders; Hauschild, Michael Zwicky

    2010-01-01

    A number of waste life cycle assessment (LCA) models have been gradually developed since the early 1990s, in a number of countries, usually independently from each other. Large discrepancies in results have been observed among different waste LCA models, although it has also been shown that results......, such as the functional unit, system boundaries, waste composition and energy modelling. The modelling assumptions of waste management processes, ranging from collection, transportation, intermediate facilities, recycling, thermal treatment, biological treatment, and landfilling, are obviously critical when comparing...... waste LCA models. This review infers that some of the differences in waste LCA models are inherent to the time they were developed. It is expected that models developed later, benefit from past modelling assumptions and knowledge and issues. Models developed in different countries furthermore rely...

  3. Testing Modeling Assumptions in the West Africa Ebola Outbreak

    Science.gov (United States)

    Burghardt, Keith; Verzijl, Christopher; Huang, Junming; Ingram, Matthew; Song, Binyang; Hasne, Marie-Pierre

    2016-10-01

    The Ebola virus in West Africa has infected almost 30,000 and killed over 11,000 people. Recent models of Ebola Virus Disease (EVD) have often made assumptions about how the disease spreads, such as uniform transmissibility and homogeneous mixing within a population. In this paper, we test whether these assumptions are necessarily correct, and offer simple solutions that may improve disease model accuracy. First, we use data and models of West African migration to show that EVD does not homogeneously mix, but spreads in a predictable manner. Next, we estimate the initial growth rate of EVD within country administrative divisions and find that it significantly decreases with population density. Finally, we test whether EVD strains have uniform transmissibility through a novel statistical test, and find that certain strains appear more often than expected by chance.

  4. Assumptions and realities of the NCLEX-RN.

    Science.gov (United States)

    Aucoin, Julia W; Treas, Leslie

    2005-01-01

    Every three years the National Council of State Boards of Nursing conducts a practice analysis to verify the activities that are tested on the licensure exam (NCLEX-RN). Faculty can benefit from information in the practice analysis to ensure that courses and experiences adequately prepare graduates for the NCLEX-RN. This summary of the practice analysis challenges common assumptions and provides recommendations for faculty.

  5. The sufficiency assumption of the reasoned approach to action

    OpenAIRE

    David Trafimow

    2015-01-01

    The reasoned action approach to understanding and predicting behavior includes the sufficiency assumption. Although variables not included in the theory may influence behavior, these variables work through the variables in the theory. Once the reasoned action variables are included in an analysis, the inclusion of other variables will not increase the variance accounted for in behavioral intentions or behavior. Reasoned action researchers are very concerned with testing if new variables accou...

  6. Some Considerations on the Basic Assumptions in Rotordynamics

    Science.gov (United States)

    GENTA, G.; DELPRETE, C.; BRUSA, E.

    1999-10-01

    The dynamic study of rotors is usually performed under a number of assumptions, namely small displacements and rotations, small unbalance and constant angular velocity. The latter assumption can be substituted by a known time history of the spin speed. The present paper develops a general non-linear model which can be used to study the rotordynamic behaviour of both fixed and free rotors without resorting to the mentioned assumptions and compares the results obtained from a number of non-linear numerical simulations with those computed through the usual linearized approach. It is so possible to verify that the validity of the rotordynamic models extends to situations in which fairly large unbalances and whirling motions are present and, above all, it is shown that the doubts forwarded about the application of a model which is based on constant spin speed to the case of free rotors in which the angular momentum is constant have no ground. Rotordynamic models can thus be used to study the stability in the small of spinning spacecrafts and the insight obtained from the study of rotors is useful to understand their attitude dynamics and its interactions with the vibration dynamics.

  7. From the lab to the world: The paradigmatic assumption and the functional cognition of avian foraging

    Institute of Scientific and Technical Information of China (English)

    Danielle SULIKOWSKI; Darren BURKE

    2015-01-01

    Mechanisms of animal learning and memory were traditionally studied without reference to niche-specific functional considerations.More recently,ecological demands have informed such investigations,most notably with respect to foraging in birds.In parallel,behavioural ecologists,primarily concerned with functional optimization,have begun to consider the role of mechanistic factors,including cognition,to explain apparent deviations from optimal predictions.In the present paper we discuss the application of laboratory-based constructs and paradigms of cognition to the real-world challenges faced by avian foragers.We argue that such applications have been handicapped by what we term the 'paradigmatic assumption'-the assumption that a given laboratory paradigm maps well enough onto a congruent cognitive mechanism (or cognitive ability) to justify conflation of the two.We present evidence against the paradigmatic assumption and suggest that to achieve a profitable integration between function and mechanism,with respect to animal cognition,a new conceptualization of cognitive mechanisms-functional cognition-is required.This new conceptualization should define cognitive mechanisms based on the informational properties of the animal's environment and the adaptive challenges faced.Cognitive mechanisms must be examined in settings that mimic the im portant aspects of the natural environment,using customized tasks designed to probe defined aspects of the mechanisms' operation.We suggest that this approach will facilitate investigations of the functional and evolutionary relevance of cognitive mechanisms,as well as the patterns of divergence,convergence and specialization of cognitive mechanisms within and between species [Current Zoology 61 (2):328-340,2015].

  8. Defining Z in Q

    CERN Document Server

    Koenigsmann, Jochen

    2010-01-01

    We show that ${\\mathbb Z}$ is definable in ${\\mathbb Q}$ by a universal first-order formula in the language of rings. We also present an $\\forall\\exists$-formula for ${\\mathbb Z}$ in ${\\mathbb Q}$ with just one universal quantifier. We exhibit new diophantine subsets of ${\\mathbb Q}$ like the set of non-squares or the complement of the image of the norm map under a quadratic extension. Finally, we show that there is no existential formula for ${\\mathbb Z}$ in ${\\mathbb Q}$, provided one assumes a strong variant of the Bombieri-Lang Conjecture for varieties over ${\\mathbb Q}$ with many ${\\mathbb Q}$-rational points.

  9. Isovector and hidden-beauty partners of the X(3872)

    Energy Technology Data Exchange (ETDEWEB)

    Høgaasen, Hallstein, E-mail: hallstein.hogasen@fys.uio.no [Department of Physics, University of Oslo, Box 1048, NO-0316 Oslo (Norway); Kou, Emi, E-mail: kou@lal.in2p3.fr [Laboratoire de l' Accélérateur Linéaire, Université Paris-Sud, IN2P3-CNRS, Centre Scientifique d' Orsay, 91898 Orsay Cedex (France); Richard, Jean-Marc, E-mail: j-m.richard@ipnl.in2p3.fr [Université de Lyon, Institut de Physique Nucléaire de Lyon, UCBL–IN2P3-CNRS, 4, rue Enrico Fermi, 69622 Villeurbanne Cedex (France); Sorba, Paul, E-mail: paul.sorba@lapth.cnrs.fr [LAPTh, Laboratoire d' Annecy-le-Vieux de Physique Théorique, CNRS, Université de Savoie, BP 110, 74941 Annecy-le-Vieux Cedex (France)

    2014-05-01

    The isovector partners of the X(3872), recently found at BES III, Belle and CLEO-c were predicted in a simple model based on the chromomagnetic interaction among quarks. The extension to the hidden-beauty sector is discussed.

  10. Local clustering in scale-free networks with hidden variables.

    Science.gov (United States)

    van der Hofstad, Remco; Janssen, A J E M; van Leeuwaarden, Johan S H; Stegehuis, Clara

    2017-02-01

    We investigate the presence of triangles in a class of correlated random graphs in which hidden variables determine the pairwise connections between vertices. The class rules out self-loops and multiple edges. We focus on the regime where the hidden variables follow a power law with exponent τ∈(2,3), so that the degrees have infinite variance. The natural cutoff h_{c} characterizes the largest degrees in the hidden variable models, and a structural cutoff h_{s} introduces negative degree correlations (disassortative mixing) due to the infinite-variance degrees. We show that local clustering decreases with the hidden variable (or degree). We also determine how the average clustering coefficient C scales with the network size N, as a function of h_{s} and h_{c}. For scale-free networks with exponent 2vanish only for networks as large as N=10^{9}.

  11. A Bell-type Theorem Without Hidden Variables

    CERN Document Server

    Stapp, Henry P

    2002-01-01

    Bell's theorem rules out local hidden-variable theories. The locality condition is the demand that what an experimenter freely chooses to measure in one space-time region has no influence in a second space-time region that is spacelike separated from the first. The hidden-variable stipulation means that this demand is implemented through requirements on an assumed-to-exist substructure involving hidden variables. The question thus arises whether the locality condition itself fails, or only its implementation by means of the assumed hidden-variable structure. This paper shows that any theory that satisfies two generally accepted features of orthodox quantum theory and that yields certain predictions of quantum theory cannot satisfy the afore-mentioned locality condition. These two features are that the choices made by the experimenters can be treated as localized free variables and that such free choices do not affect outcomes that have already occurred.

  12. Modelling proteins' hidden conformations to predict antibiotic resistance

    Science.gov (United States)

    Hart, Kathryn M.; Ho, Chris M. W.; Dutta, Supratik; Gross, Michael L.; Bowman, Gregory R.

    2016-10-01

    TEM β-lactamase confers bacteria with resistance to many antibiotics and rapidly evolves activity against new drugs. However, functional changes are not easily explained by differences in crystal structures. We employ Markov state models to identify hidden conformations and explore their role in determining TEM's specificity. We integrate these models with existing drug-design tools to create a new technique, called Boltzmann docking, which better predicts TEM specificity by accounting for conformational heterogeneity. Using our MSMs, we identify hidden states whose populations correlate with activity against cefotaxime. To experimentally detect our predicted hidden states, we use rapid mass spectrometric footprinting and confirm our models' prediction that increased cefotaxime activity correlates with reduced Ω-loop flexibility. Finally, we design novel variants to stabilize the hidden cefotaximase states, and find their populations predict activity against cefotaxime in vitro and in vivo. Therefore, we expect this framework to have numerous applications in drug and protein design.

  13. Recent Applications of Hidden Markov Models in Computational Biology

    Institute of Scientific and Technical Information of China (English)

    Khar Heng Choo; Joo Chuan Tong; Louxin Zhang

    2004-01-01

    This paper examines recent developments and applications of Hidden Markov Models (HMMs) to various problems in computational biology, including multiple sequence alignment, homology detection, protein sequences classification, and genomic annotation.

  14. Search for hidden particles with the SHiP experiment

    Energy Technology Data Exchange (ETDEWEB)

    Hagner, Caren; Bick, Daniel; Bieschke, Stefan; Ebert, Joachim; Schmidt-Parzefall, Walter [Universitaet Hamburg, Institut fuer Experimentalphysik, Luruper Chaussee 149, 22761 Hamburg (Germany)

    2016-07-01

    Many theories beyond the standard model predict long lived neutral (hidden) particles. There might be a whole Hidden Sector (HS) of weakly interacting particles, which cannot be detected in existing high energy experiments. The SHiP experiment (Search for Hidden Particles) requires a high intensity beam dump, which could be realized by a new facility at the CERN SPS accelerator. New superweakly interacting particles with masses below O(10) GeV could be produced in the beam dump and detected in a general purpose Hidden Sector (HS) detector. In addition there will be a dedicated tau neutrino subdetector. I present the major requirements and technical challenges for the HS detector and discuss how the HS can be accessed through several portals: neutrino portal, scalar portal, vector portal and many more.

  15. Dark matter in the nonabelian hidden gauge theory

    CERN Document Server

    Yamanaka, Nodoka; Gongyo, Shinya; Iida, Hideaki

    2015-01-01

    We discuss the dark matter in the hidden gauge theory. We propose a scenario where the mini-inflation dilutes the dark matter density. This scenario is consistent with the current baryon number asymmetry.

  16. Software-Defined Cluster

    Institute of Scientific and Technical Information of China (English)

    聂华; 杨晓君; 刘淘英

    2015-01-01

    The cluster architecture has played an important role in high-end computing for the past 20 years. With the advent of Internet services, big data, and cloud computing, traditional clusters face three challenges: 1) providing flexible system balance among computing, memory, and I/O capabilities;2) reducing resource pooling overheads;and 3) addressing low performance-power efficiency. This position paper proposes a software-defined cluster (SDC) architecture to deal with these challenges. The SDC architecture inherits two features of traditional cluster: its architecture is multicomputer and it has loosely-coupled interconnect. SDC provides two new mechanisms: global I/O space (GIO) and hardware-supported native access (HNA) to remote devices. Application software can define a virtual cluster best suited to its needs from resources pools provided by a physical cluster, and traditional cluster ecosystems need no modification. We also discuss a prototype design and implementation of a 32-processor cloud server utilizing the SDC architecture.

  17. Hidden Symmetry from Supersymmetry in One-Dimensional Quantum Mechanics

    Directory of Open Access Journals (Sweden)

    Alexander A. Andrianov

    2009-06-01

    Full Text Available When several inequivalent supercharges form a closed superalgebra in Quantum Mechanics it entails the appearance of hidden symmetries of a Super-Hamiltonian. We examine this problem in one-dimensional QM for the case of periodic potentials and potentials with finite number of bound states. After the survey of the results existing in the subject the algebraic and analytic properties of hidden-symmetry differential operators are rigorously elaborated in the Theorems and illuminated by several examples.

  18. Stabilization of stochastic systems with hidden Markovian jumps

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    This paper considers the adaptive control of discrete-time hybrid stochastic systems with unknown randomly jumping parameters described by a finite-state hidden Markov chain. An intuitive yet longstanding conjecture in this area is that such hybrid systems can be adaptively stabilized whenever the rate of transition of the hidden Markov chain is small enough. This paper provides a rigorous positive answer to this conjecture by establishing the global stability of a gradient-algorithm-based adaptive linear-quadratic control.

  19. Extracting hidden trails and roads under canopy using LIDAR

    OpenAIRE

    Krougios, Prokopios

    2008-01-01

    The field of Remote Sensing has been greatly benefited by the development of LIDAR. The extraction of bare earth under tree canopies and especially the identification of hidden trails are important tools for military and civilian operations in dense forests. LIDAR data from Sequoia National Park in California (2008) and Fort Belvoir Military Base in Virginia (2007) were two areas that were selected for analysis. Quick Terrain Modeler software was used in order to recognize hidden trails....

  20. Physical nature of a hidden mass in the Universe

    Energy Technology Data Exchange (ETDEWEB)

    Doroshkevich, A.G.; Khlopov, M.Yu. (AN SSSR, Moscow. Inst. Prikladnoj Matematiki)

    1984-04-01

    The problem of an origin of the hidden mass of the Universe is discussed. Observation astronomic data on large-scale Universe structure and hidden mass distribution within the framework of the adiabatic theory of galaxies formation point out the dominance in nowadays Universe of weakly-interacting particles with 15-60 eV mass. Restrictions are obtained for a possible admixture of other relict particles.

  1. Hidden Markov Models with Factored Gaussian Mixtures Densities

    Institute of Scientific and Technical Information of China (English)

    LI Hao-zheng; LIU Zhi-qiang; ZHU Xiang-hua

    2004-01-01

    We present a factorial representation of Gaussian mixture models for observation densities in Hidden Markov Models(HMMs), which uses the factorial learning in the HMM framework. We derive the reestimation formulas for estimating the factorized parameters by the Expectation Maximization (EM) algorithm. We conduct several experiments to compare the performance of this model structure with Factorial Hidden Markov Models(FHMMs) and HMMs, some conclusions and promising empirical results are presented.

  2. Aligning the Hidden Curriculum of Management Education With PRME

    DEFF Research Database (Denmark)

    Blasco, Maribel

    2012-01-01

    This article argues that mainstreaming responsible management education in line with the Principles of Responsible Management Education (PRME) requires close attention to the hidden curriculum (HC), that is, the implicit dimensions of educational experiences. Altering formal curricular goals...... combined with transformative learning and communities of practice theory, the article offers an inquiry-based framework for PRME implementation that takes these moral learning and socialization processes into account. It provides suggestions for how to address the hidden curriculum both in the diagnostic...

  3. Search algorithms, hidden labour and information control

    Directory of Open Access Journals (Sweden)

    Paško Bilić

    2016-06-01

    Full Text Available The paper examines some of the processes of the closely knit relationship between Google’s ideologies of neutrality and objectivity and global market dominance. Neutrality construction comprises an important element sustaining the company’s economic position and is reflected in constant updates, estimates and changes to utility and relevance of search results. Providing a purely technical solution to these issues proves to be increasingly difficult without a human hand in steering algorithmic solutions. Search relevance fluctuates and shifts through continuous tinkering and tweaking of the search algorithm. The company also uses third parties to hire human raters for performing quality assessments of algorithmic updates and adaptations in linguistically and culturally diverse global markets. The adaptation process contradicts the technical foundations of the company and calculations based on the initial Page Rank algorithm. Annual market reports, Google’s Search Quality Rating Guidelines, and reports from media specialising in search engine optimisation business are analysed. The Search Quality Rating Guidelines document provides a rare glimpse into the internal architecture of search algorithms and the notions of utility and relevance which are presented and structured as neutral and objective. Intertwined layers of ideology, hidden labour of human raters, advertising revenues, market dominance and control are discussed throughout the paper.

  4. A hidden classical symmetry of QCD

    CERN Document Server

    Glozman, L Ya

    2016-01-01

    The classical part of the QCD partition function (the integrand) has, ignoring irrelevant exact zero modes of the Dirac operator, a local SU(2N_F) \\supset SU(N_F)_L \\times SU(N_F)_R \\times U(1)_A symmetry which is absent at the Lagrangian level. This symmetry is broken anomalously and spontaneously. Effects of spontaneous breaking of chiral symmetry are contained in the near-zero modes of the Dirac operator. If physics of anomaly is also encoded in the same near-zero modes, then their truncation on the lattice should recover a hidden classical SU(2N_F) symmetry in correlators and spectra. This naturally explains observation on the lattice of a large degeneracy of hadrons, that is higher than the SU(N_F)_L \\times SU(N_F)_R \\times U(1)_A chiral symmetry, upon elimination by hands of the lowest-lying modes of the Dirac operator. We also discuss an implication of this symmetry for the high temperature QCD.

  5. Seiberg duality versus hidden local symmetry

    CERN Document Server

    Abel, Steven

    2012-01-01

    It is widely believed that the emergent magnetic gauge symmetry of SQCD is analogous to a hidden local symmetry (HLS). We explore this idea in detail, deriving the entire (spontaneously broken) magnetic theory by applying the HLS formalism to spontaneously broken SU(N) SQCD. We deduce the K\\"ahler potential in the HLS description, and show that gauge and flavour symmetry are smoothly restored along certain scaling directions in moduli space. We propose that it is these symmetry restoring directions, associated with the R-symmetry of the theory, that allow full Seiberg duality. Reconsidering the origin of the magnetic gauge bosons as the rho-mesons of the electric theory, colour-flavour locking allows a simple determination of the parameter "a". Its value continuously interpolates between a=2 on the baryonic branch of moduli space - corresponding to "vector meson dominance" - and a=1 on the mesonic branch. Both limiting values are consistent with previous results in the literature. The HLS formalism is further...

  6. Natural inflation with hidden scale invariance

    Directory of Open Access Journals (Sweden)

    Neil D. Barrie

    2016-05-01

    Full Text Available We propose a new class of natural inflation models based on a hidden scale invariance. In a very generic Wilsonian effective field theory with an arbitrary number of scalar fields, which exhibits scale invariance via the dilaton, the potential necessarily contains a flat direction in the classical limit. This flat direction is lifted by small quantum corrections and inflation is realised without need for an unnatural fine-tuning. In the conformal limit, the effective potential becomes linear in the inflaton field, yielding to specific predictions for the spectral index and the tensor-to-scalar ratio, being respectively: ns−1≈−0.025(N⋆60−1 and r≈0.0667(N⋆60−1, where N⋆≈30–65 is a number of efolds during observable inflation. This predictions are in reasonable agreement with cosmological measurements. Further improvement of the accuracy of these measurements may turn out to be critical in falsifying our scenario.

  7. Search algorithms, hidden labour and information control

    Directory of Open Access Journals (Sweden)

    Paško Bilić

    2016-06-01

    Full Text Available The paper examines some of the processes of the closely knit relationship between Google’s ideologies of neutrality and objectivity and global market dominance. Neutrality construction comprises an important element sustaining the company’s economic position and is reflected in constant updates, estimates and changes to utility and relevance of search results. Providing a purely technical solution to these issues proves to be increasingly difficult without a human hand in steering algorithmic solutions. Search relevance fluctuates and shifts through continuous tinkering and tweaking of the search algorithm. The company also uses third parties to hire human raters for performing quality assessments of algorithmic updates and adaptations in linguistically and culturally diverse global markets. The adaptation process contradicts the technical foundations of the company and calculations based on the initial Page Rank algorithm. Annual market reports, Google’s Search Quality Rating Guidelines, and reports from media specialising in search engine optimisation business are analysed. The Search Quality Rating Guidelines document provides a rare glimpse into the internal architecture of search algorithms and the notions of utility and relevance which are presented and structured as neutral and objective. Intertwined layers of ideology, hidden labour of human raters, advertising revenues, market dominance and control are discussed throughout the paper.

  8. Natural Inflation with Hidden Scale Invariance

    CERN Document Server

    Barrie, Neil D; Liang, Shelley

    2016-01-01

    We propose a new class of natural inflation models based on a hidden scale invariance. In a very generic Wilsonian effective field theory with an arbitrary number of scalar fields, which exhibits scale invariance via the dilaton, the potential necessarily contains a flat direction in the classical limit. This flat direction is lifted by small quantum corrections and inflation is realised without need for an unnatural fine-tuning. In the conformal limit, the effective potential becomes linear in the inflaton field, yielding to specific predictions for the spectral index and the tensor-to-scalar ratio, being respectively: $n_s-1\\approx 0.025\\left(\\frac{N_{\\star}}{60}\\right)^{-1}$ and $r\\approx 0.0667\\left(\\frac{N_{\\star}}{60}\\right)^{-1}$, where $N_{\\star}\\approx 30-65$ is a number of efolds during observable inflation. This predictions are in reasonable agreement with cosmological measurements. Further improvement of the accuracy of these measurements may turn out to be critical in falsifying our scenario.

  9. Stochastic precipitation generator with hidden state covariates

    Science.gov (United States)

    Kim, Yongku; Lee, GyuWon

    2017-08-01

    Time series of daily weather such as precipitation, minimum temperature and maximum temperature are commonly required for various fields. Stochastic weather generators constitute one of the techniques to produce synthetic daily weather. The recently introduced approach for stochastic weather generators is based on generalized linear modeling (GLM) with covariates to account for seasonality and teleconnections (e.g., with the El Niño). In general, stochastic weather generators tend to underestimate the observed interannual variance of seasonally aggregated variables. To reduce this overdispersion, we incorporated time series of seasonal dry/wet indicators in the GLM weather generator as covariates. These seasonal time series were local (or global) decodings obtained by a hidden Markov model of seasonal total precipitation and implemented in the weather generator. The proposed method is applied to time series of daily weather from Seoul, Korea and Pergamino, Argentina. This method provides a straightforward translation of the uncertainty of the seasonal forecast to the corresponding conditional daily weather statistics.

  10. Academic mobbing: hidden health hazard at workplace.

    Science.gov (United States)

    Khoo, Sb

    2010-01-01

    Academic mobbing is a non-violent, sophisticated, 'ganging up' behaviour adopted by academicians to "wear and tear" a colleague down emotionally through unjustified accusation, humiliation, general harassment and emotional abuse. These are directed at the target under a veil of lies and justifications so that they are "hidden" to others and difficult to prove. Bullies use mobbing activities to hide their own weaknesses and incompetence. Targets selected are often intelligent, innovative high achievers, with good integrity and principles. Mobbing activities appear trivial and innocuous on its own but the frequency and pattern of their occurrence over long period of time indicates an aggressive manipulation to "eliminate" the target. Mobbing activities typically progress through five stereotypical phases that begins with an unsolved minor conflict between two workers and ultimately escalates into a senseless mobbing whereby the target is stigmatized and victimized to justify the behaviours of the bullies. The result is always physical, mental, social distress or illness and, most often, expulsion of target from the workplace. Organizations are subjected to great financial loss, loss of key workers and a tarnished public image and reputation. Public awareness, education, effective counselling, establishment of anti-bullying policies and legislations at all levels are necessary to curb academic mobbing. General practitioners (GPs) play an important role in supporting patients subjected to mental and physical health injury caused by workplace bullying and mobbing.

  11. Coulomb gauge model for hidden charm tetraquarks

    Science.gov (United States)

    Xie, W.; Mo, L. Q.; Wang, Ping; Cotanch, Stephen R.

    2013-08-01

    The spectrum of tetraquark states with hidden charm is studied within an effective Coulomb gauge Hamiltonian approach. Of the four independent color schemes, two are investigated, the (qcbar)1(cqbar)1 singlet-singlet (molecule) and the (qc)3(qbarcbar)3 triplet-triplet (diquark), for selected JPC states using a variational method. The predicted masses of triplet-triplet tetraquarks are roughly a GeV heavier than the singlet-singlet states. There is also an interesting flavor dependence with (qqbar)1 (ccbar1) states about half a GeV lighter than (qcbar)1(qbarc)1. The lightest 1++ and 1-- predictions are in agreement with the observed X (3872) and Y (4008) masses suggesting they are molecules with ωJ / ψ and ηhc, rather than D*Dbar* and DDbar, type structure, respectively. Similarly, the lightest isovector 1++ molecule, having a ρJ / ψ flavor composition, has mass near the recently observed charged Zc (3900) value. These flavor configurations are consistent with observed X, Y and Zc decays to ππJ / ψ.

  12. Hidden topological angles and Lefschetz thimbles

    CERN Document Server

    Behtash, Alireza; Schaefer, Thomas; Unsal, Mithat

    2015-01-01

    We demonstrate the existence of hidden topological angles (HTAs) in a large class of quantum field theories and quantum mechanical systems. HTAs are distinct from theta-parameters in the lagrangian. They arise as invariant angle associated with saddle points of the complexified path integral and their descent manifolds (Lefschetz thimbles). Physical effects of HTAs become most transparent upon analytic continuation in $n_f$ to non-integer number of flavors, reducing in the integer $n_f$ limit to a $\\mathbb Z_2$ valued phase difference between dominant saddles. In ${\\cal N}=1$ super Yang-Mills theory we demonstrate the microscopic mechanism for the vanishing of the gluon condensate. The same effect leads to an anomalously small condensate in a QCD-like $SU(N)$ gauge theory with fermions in the two-index representation. The basic phenomenon is that, contrary to folklore, the gluon condensate can receive both positive and negative contributions in a semi-classical expansion. In quantum mechanics, a HTA leads to ...

  13. Detecting hidden sources-STUK/HUT team

    Energy Technology Data Exchange (ETDEWEB)

    Nikkinen, M.; Aarnio, P. [Helsinki Univ. of Technology, Espoo (Finland); Honkamaa, T.; Tiilikainen, H. [Finnish Centre for Radiation and Nuclear Safety, Helsinki (Finland)

    1997-12-31

    The task of the team was to locate and to identify hidden sources in a specified area in Padasjoki Auttoinen village. The team used AB-420 helicopter of the Finnish Frontier Guard. The team had two measuring systems: HPGe system (relative efficiency 18%) and 5`x5` NaI system. The team found two sources in real-time and additional two sources after 24 h analysis time. After the locations and characteristics of the sources were announced it was found out that altogether six sources would have been possible to find using the measured data. The total number of sources was ten. The NaI detector was good at detecting and locating the sources and HPGe was most useful in identification and calculation of the activity estimates. The following development should be made: 1) larger detectors are needed, 2) the software has to be improved. (This has been performed after the exercise) and 3) the navigation must be based on DGPS. visual navigation causes easily gaps between the flight lines and some sources may not be detected. (au).

  14. Hidden Web Data Extraction Using Dynamic Rule Generation

    Directory of Open Access Journals (Sweden)

    Anuradha

    2011-08-01

    Full Text Available World Wide Web is a global information medium of interlinked hypertext documents accessed via computers connected to the internet. Most of the users rely on traditional search engines to search theinformation on the web. These search engines deal with the Surface Web which is a set of Web pages directly accessible through hyperlinks and ignores a large part of the Web called Hidden Web which is hidden to present-day search engines. It lies behind search forms and this part of the web containing an almost endless amount of sources providing high quality information stored in specialized databases can be found in the depths of the WWW. A large amount of this Hidden web is structured i.e Hidden websites contain the information in the form of lists and tables. However visiting dozens of these sites and analyzing the results is very much time consuming task for user. Hence, it is desirable to build a prototype which will minimize user’s effort and give him high quality information in integrated form. This paper proposes a novel method that extracts the data records from the lists and tables of various hidden web sites of same domain using dynamic rule generation and forms a repository which is used for later searching. By searching the data from this repository, user will find the desired data at one place. It reduces the user’s effort to look at various result pages of different hidden websites.

  15. Market-oriented management method of coalmine accident hidden dangers

    Institute of Scientific and Technical Information of China (English)

    LIU Zhao-xia; LI Xing-dong; LU Ying; REN Da-wei

    2007-01-01

    By analyzing the problems which exist currently in the accident hidden dangers management of the coal mine, this paper proposed a new kind of management method-"simulating the market", in which an operation pattern of simulating the market to transact hidden troubles was constructed. This method introduces "Market Mechanism"into safe management, and adopts measurable value to describe the hidden dangers such as" human behavior, technique, environment, equipments etc.". It regards the hidden dangers as "the goods produced by labor" which are found out by the safety managers and the security inspectors, then sells as "commodity". By the process of disposing, counterchecking, re-selling, and redisposing. It forms a set of market-oriented closed-form management pattern of coalmine accident hidden dangers. This kind of management method changes the past traditional methods in which the wageworkers treat safety management passively, but to encourage and restrict them to participate in the check-up and improvement of the hidden dangers.

  16. QCD sum rule study of hidden-charm pentaquarks

    CERN Document Server

    Chen, Hua-Xing; Chen, Wei; Steele, T G; Liu, Xiang; Zhu, Shi-Lin

    2016-01-01

    We study the mass spectra of hidden-charm pentaquarks having spin $J = {1\\over2},{3\\over2},{5\\over2}$ and quark contents $uud c \\bar c$. We systematically construct all the relevant local hidden-charm pentaquark currents, and select some of them to perform QCD sum rule analyses. We find that the $P_c(4380)$ and $P_c(4450)$ can be identified as hidden-charm pentaquark states composed of an anti-charmed meson and a charmed baryon. We also find the lowest-lying hidden-charm $J^P = 1/2^-$ pentaquark state of mass $4.33^{+0.17}_{-0.13}$ GeV, while the $J^P = 1/2^+$ mass prediction of 4.7--4.9 GeV is significantly higher. Similarly, the lowest-lying hidden-charm $J^P = 3/2^-$ pentaquark state mass is $4.37^{+0.18}_{-0.13}$ GeV, consistent with the $J^P = 3/2^-$ $P_c(4380)$, while the $J^P = 3/2^+$ is also significantly higher with a mass above 4.6 GeV. The hidden-charm $J^P = 5/2^-$ pentaquark state mass is 4.5--4.6 GeV, slightly larger than the $J^P = 5/2^+$ $P_c(4450)$.

  17. Implementing Software Defined Radio

    CERN Document Server

    Grayver, Eugene

    2013-01-01

    Software Defined Radio makes wireless communications easier, more efficient, and more reliable. This book bridges the gap between academic research and practical implementation. When beginning a project, practicing engineers, technical managers, and graduate students can save countless hours by considering the concepts presented in these pages. The author covers the myriad options and trade-offs available when selecting an appropriate hardware architecture. As demonstrated here, the choice between hardware- and software-centric architecture can mean the difference between meeting an aggressive schedule and bogging down in endless design iterations. Because of the author’s experience overseeing dozens of failed and successful developments, he is able to present many real-life examples. Some of the key concepts covered are: Choosing the right architecture for the market – laboratory, military, or commercial Hardware platforms – FPGAs, GPPs, specialized and hybrid devices Standardization efforts to ens...

  18. Defining cyber warfare

    Directory of Open Access Journals (Sweden)

    Dragan D. Mladenović

    2012-04-01

    Full Text Available Cyber conflicts represent a new kind of warfare that is technologically developing very rapidly. Such development results in more frequent and more intensive cyber attacks undertaken by states against adversary targets, with a wide range of diverse operations, from information operations to physical destruction of targets. Nevertheless, cyber warfare is waged through the application of the same means, techniques and methods as those used in cyber criminal, terrorism and intelligence activities. Moreover, it has a very specific nature that enables states to covertly initiate attacks against their adversaries. The starting point in defining doctrines, procedures and standards in the area of cyber warfare is determining its true nature. In this paper, a contribution to this effort was made through the analysis of the existing state doctrines and international practice in the area of cyber warfare towards the determination of its nationally acceptable definition.

  19. Evaluating risk factor assumptions: a simulation-based approach

    Directory of Open Access Journals (Sweden)

    Miglioretti Diana L

    2011-09-01

    Full Text Available Abstract Background Microsimulation models are an important tool for estimating the comparative effectiveness of interventions through prediction of individual-level disease outcomes for a hypothetical population. To estimate the effectiveness of interventions targeted toward high risk groups, the mechanism by which risk factors influence the natural history of disease must be specified. We propose a method for evaluating these risk factor assumptions as part of model-building. Methods We used simulation studies to examine the impact of risk factor assumptions on the relative rate (RR of colorectal cancer (CRC incidence and mortality for a cohort with a risk factor compared to a cohort without the risk factor using an extension of the CRC-SPIN model for colorectal cancer. We also compared the impact of changing age at initiation of screening colonoscopy for different risk mechanisms. Results Across CRC-specific risk factor mechanisms, the RR of CRC incidence and mortality decreased (towards one with increasing age. The rate of change in RRs across age groups depended on both the risk factor mechanism and the strength of the risk factor effect. Increased non-CRC mortality attenuated the effect of CRC-specific risk factors on the RR of CRC when both were present. For each risk factor mechanism, earlier initiation of screening resulted in more life years gained, though the magnitude of life years gained varied across risk mechanisms. Conclusions Simulation studies can provide insight into both the effect of risk factor assumptions on model predictions and the type of data needed to calibrate risk factor models.

  20. THE COMPLEX OF ASSUMPTION CATHEDRAL OF THE ASTRAKHAN KREMLIN

    Directory of Open Access Journals (Sweden)

    Savenkova Aleksandra Igorevna

    2016-08-01

    Full Text Available This article is devoted to an architectural and historical analysis of the constructions forming a complex of Assumption Cathedral of the Astrakhan Kremlin, which earlier hasn’t been considered as a subject of special research. Basing on the archival sources, photographic materials, publications and on-site investigations of monuments, the creation history of the complete architectural complex sustained in one style of the Muscovite baroque, unique in its composite construction, is considered. Its interpretation in the all-Russian architectural context is offered. Typological features of single constructions come to light. The typology of the Prechistinsky bell tower has an untypical architectural solution - “hexagonal structure on octagonal and quadrangular structures”. The way of connecting the building of the Cathedral and the chambers by the passage was characteristic of monastic constructions and was exclusively seldom in kremlins, farmsteads and ensembles of city cathedrals. The composite scheme of the Assumption Cathedral includes the Lobnoye Mesto (“the Place of Execution” located on an axis from the West, it is connected with the main building by a quarter-turn with landing. The only prototype of the structure is a Lobnoye Mesto on the Red Square in Moscow. In the article the version about the emergence of the Place of Execution on the basis of earlier existing construction - a tower “the Peal” which is repeatedly mentioned in written sources in connection with S. Razin’s revolt is considered. The metropolitan Sampson, trying to keep the value of the Astrakhan metropolitanate, builds the Assumption Cathedral and the Place of Execution directly appealing to a capital prototype to emphasize the continuity and close connection with Moscow.

  1. Bayesian inversion of seismic attributes for geological facies using a Hidden Markov Model

    Science.gov (United States)

    Nawaz, Muhammad Atif; Curtis, Andrew

    2017-02-01

    Markov chain Monte-Carlo (McMC) sampling generates correlated random samples such that their distribution would converge to the true distribution only as the number of samples tends to infinity. In practice, McMC is found to be slow to converge, convergence is not guaranteed to be achieved in finite time, and detection of convergence requires the use of subjective criteria. Although McMC has been used for decades as the algorithm of choice for inference in complex probability distributions, there is a need to seek alternative approaches, particularly in high dimensional problems. Walker & Curtis (2014) developed a method for Bayesian inversion of 2-D spatial data using an exact sampling alternative to McMC which always draws independent samples of the target distribution. Their method thus obviates the need for convergence and removes the concomitant bias exhibited by finite sample sets. Their algorithm is nevertheless computationally intensive and requires large memory. We propose a more efficient method for Bayesian inversion of categorical variables, such as geological facies that requires no sampling at all. The method is based on a 2-D Hidden Markov Model (2D-HMM) over a grid of cells where observations represent localized data constraining each cell. The data in our example application are seismic attributes such as P- and S-wave impedances and rock density; our categorical variables are the hidden states and represent the geological rock types in each cell-facies of distinct subsets of lithology and fluid combinations such as shale, brine-sand and gas-sand. The observations at each location are assumed to be generated from a random function of the hidden state (facies) at that location, and to be distributed according to a certain probability distribution that is independent of hidden states at other locations - an assumption referred to as `localized likelihoods'. The hidden state (facies) at a location cannot be determined solely by the observation at that

  2. Evaluating The Markov Assumption For Web Usage Mining

    DEFF Research Database (Denmark)

    Jespersen, S.; Pedersen, Torben Bach; Thorhauge, J.

    2003-01-01

    Web usage mining concerns the discovery of common browsing patterns, i.e., pages requested in sequence, from web logs. To cope with the enormous amounts of data, several aggregated structures based on statistical models of web surfing have appeared, e.g., the Hypertext Probabilistic Grammar (HPG......) model~\\cite{borges99data}. These techniques typically rely on the \\textit{Markov assumption with history depth} $n$, i.e., it is assumed that the next requested page is only dependent on the last $n$ pages visited. This is not always valid, i.e. false browsing patterns may be discovered. However, to our...

  3. AN EFFICIENT BIT COMMITMENT SCHEME BASED ON FACTORING ASSUMPTION

    Institute of Scientific and Technical Information of China (English)

    Zhong Ming; Yang Yixian

    2001-01-01

    Recently, many bit commitment schemes have been presented. This paper presents a new practical bit commitment scheme based on Schnorr's one-time knowledge proof scheme,where the use of cut-and-choose method and many random exam candidates in the protocols are replaced by a single challenge number. Therefore the proposed bit commitment scheme is more efficient and practical than the previous schemes In addition, the security of the proposed scheme under factoring assumption is proved, thus the cryptographic basis of the proposed scheme is clarified.

  4. Radiation hormesis and the linear-no-threshold assumption

    CERN Document Server

    Sanders, Charles L

    2009-01-01

    Current radiation protection standards are based upon the application of the linear no-threshold (LNT) assumption, which considers that even very low doses of ionizing radiation can cause cancer. The radiation hormesis hypothesis, by contrast, proposes that low-dose ionizing radiation is beneficial. In this book, the author examines all facets of radiation hormesis in detail, including the history of the concept and mechanisms, and presents comprehensive, up-to-date reviews for major cancer types. It is explained how low-dose radiation can in fact decrease all-cause and all-cancer mortality an

  5. Discourses and Theoretical Assumptions in IT Project Portfolio Management

    DEFF Research Database (Denmark)

    Hansen, Lars Kristian; Kræmmergaard, Pernille

    2014-01-01

    articles across various research disciplines. We find and classify a stock of 107 relevant articles into four scientific discourses: the normative, the interpretive, the critical, and the dialogical discourses, as formulated by Deetz (1996). We find that the normative discourse dominates the IT PPM......, metaphors, information systems....... literature, and few contributions represent the three remaining discourses, which unjustifiably leaves out issues that research could and most probably should investigate. In order to highlight research potentials, limitations, and underlying assumptions of each discourse, we develop four IT PPM metaphors...

  6. Was ist das Hidden Web? Die Entstehung, Eigenschaften und gesellschaftliche Bedeutung von anonymer Kommunikation im Hidden Web.

    OpenAIRE

    Papsdorf, Christian

    2016-01-01

    More than two-and-a-half million people currently use the Tor network to communicate anonymously via the Internet and gain access to online media that are not accessible using standard Internet technology. This sphere of communication can be described as the hidden web. In part because this phenomenon is very recent, the subject has scarcely been studied in the social sciences. It is therefore the purpose of this paper to answer four fundamental questions: What is the hidden web? What charact...

  7. The hidden minority? Dilemmas around the status of the russophone Ukrainians in contemporary Ukraine

    Directory of Open Access Journals (Sweden)

    Karolina Koziura

    2014-12-01

    Full Text Available The hidden minority? Dilemmas around the status of the russophone Ukrainians in contemporary Ukraine Ukraine, as one of the states which became independent in 1991, can be perceived as an example of the typical transition of Soviet Socialist Republics into democratic states centered on the issue of nationalizing policies and processes. However, there are also differences which make this country a very interesting case study for investigation. Mainly, Russians here form the biggest national group concentrated in the East and South of the country. The persistence and reuse of the “myth of two Ukraines” led to the widespread conclusion that Ukraine is a country which is divided between Ukrainophone West and Russophone East. This article is focuses on the third group, which is somehow hidden in the mainstream linguistic debates, namely the Russian-speaking citizens of Ukraine who define themselves as ethnic Ukrainians. Based on the examples of Donbas and Crimean regions, it tries to define whether one can perceive them as a national minority.

  8. Classification of EEG Single Trial Microstates Using Local Global Graphs and Discrete Hidden Markov Models.

    Science.gov (United States)

    Michalopoulos, Kostas; Zervakis, Michalis; Deiber, Marie-Pierre; Bourbakis, Nikolaos

    2016-09-01

    We present a novel synergistic methodology for the spatio-temporal analysis of single Electroencephalogram (EEG) trials. This new methodology is based on the novel synergy of Local Global Graph (LG graph) to characterize define the structural features of the EEG topography as a global descriptor for robust comparison of dominant topographies (microstates) and Hidden Markov Models (HMM) to model the topographic sequence in a unique way. In particular, the LG graph descriptor defines similarity and distance measures that can be successfully used for the difficult comparison of the extracted LG graphs in the presence of noise. In addition, hidden states represent periods of stationary distribution of topographies that constitute the equivalent of the microstates in the model. The transitions between the different microstates and the formed syntactic patterns can reveal differences in the processing of the input stimulus between different pathologies. We train the HMM model to learn the transitions between the different microstates and express the syntactic patterns that appear in the single trials in a compact and efficient way. We applied this methodology in single trials consisting of normal subjects and patients with Progressive Mild Cognitive Impairment (PMCI) to discriminate these two groups. The classification results show that this approach is capable to efficiently discriminate between control and Progressive MCI single trials. Results indicate that HMMs provide physiologically meaningful results that can be used in the syntactic analysis of Event Related Potentials.

  9. Landmine detection using mixture of discrete hidden Markov models

    Science.gov (United States)

    Frigui, Hichem; Hamdi, Anis; Missaoui, Oualid; Gader, Paul

    2009-05-01

    We propose a landmine detection algorithm that uses a mixture of discrete hidden Markov models. We hypothesize that the data are generated by K models. These different models reflect the fact that mines and clutter objects have different characteristics depending on the mine type, soil and weather conditions, and burial depth. Model identification could be achieved through clustering in the parameters space or in the feature space. However, this approach is inappropriate as it is not trivial to define a meaningful distance metric for model parameters or sequence comparison. Our proposed approach is based on clustering in the log-likelihood space, and has two main steps. First, one HMM is fit to each of the R individual sequence. For each fitted model, we evaluate the log-likelihood of each sequence. This will result in an R×R log-likelihood distance matrix that will be partitioned into K groups using a hierarchical clustering algorithm. In the second step, we pool the sequences, according to which cluster they belong, into K groups, and we fit one HMM to each group. The mixture of these K HMMs would be used to build a descriptive model of the data. An artificial neural networks is then used to fuse the output of the K models. Results on large and diverse Ground Penetrating Radar data collections show that the proposed method can identify meaningful and coherent HMM models that describe different properties of the data. Each HMM models a group of alarm signatures that share common attributes such as clutter, mine type, and burial depth. Our initial experiments have also indicated that the proposed mixture model outperform the baseline HMM that uses one model for the mine and one model for the background.

  10. Defining the Anthropocene

    Science.gov (United States)

    Lewis, Simon; Maslin, Mark

    2016-04-01

    Time is divided by geologists according to marked shifts in Earth's state. Recent global environmental changes suggest that Earth may have entered a new human-dominated geological epoch, the Anthropocene. Should the Anthropocene - the idea that human activity is a force acting upon the Earth system in ways that mean that Earth will be altered for millions of years - be defined as a geological time-unit at the level of an Epoch? Here we appraise the data to assess such claims, first in terms of changes to the Earth system, with particular focus on very long-lived impacts, as Epochs typically last millions of years. Can Earth really be said to be in transition from one state to another? Secondly, we then consider the formal criteria used to define geological time-units and move forward through time examining whether currently available evidence passes typical geological time-unit evidence thresholds. We suggest two time periods likely fit the criteria (1) the aftermath of the interlinking of the Old and New Worlds, which moved species across continents and ocean basins worldwide, a geologically unprecedented and permanent change, which is also the globally synchronous coolest part of the Little Ice Age (in Earth system terms), and the beginning of global trade and a new socio-economic "world system" (in historical terms), marked as a golden spike by a temporary drop in atmospheric CO2, centred on 1610 CE; and (2) the aftermath of the Second World War, when many global environmental changes accelerated and novel long-lived materials were increasingly manufactured, known as the Great Acceleration (in Earth system terms) and the beginning of the Cold War (in historical terms), marked as a golden spike by the peak in radionuclide fallout in 1964. We finish by noting that the Anthropocene debate is politically loaded, thus transparency in the presentation of evidence is essential if a formal definition of the Anthropocene is to avoid becoming a debate about bias. The

  11. Halo-Independent Direct Detection Analyses Without Mass Assumptions

    CERN Document Server

    Anderson, Adam J; Kahn, Yonatan; McCullough, Matthew

    2015-01-01

    Results from direct detection experiments are typically interpreted by employing an assumption about the dark matter velocity distribution, with results presented in the $m_\\chi-\\sigma_n$ plane. Recently methods which are independent of the DM halo velocity distribution have been developed which present results in the $v_{min}-\\tilde{g}$ plane, but these in turn require an assumption on the dark matter mass. Here we present an extension of these halo-independent methods for dark matter direct detection which does not require a fiducial choice of the dark matter mass. With a change of variables from $v_{min}$ to nuclear recoil momentum ($p_R$), the full halo-independent content of an experimental result for any dark matter mass can be condensed into a single plot as a function of a new halo integral variable, which we call $\\tilde{h}(p_R)$. The entire family of conventional halo-independent $\\tilde{g}(v_{min})$ plots for all DM masses are directly found from the single $\\tilde{h}(p_R)$ plot through a simple re...

  12. The contour method cutting assumption: error minimization and correction

    Energy Technology Data Exchange (ETDEWEB)

    Prime, Michael B [Los Alamos National Laboratory; Kastengren, Alan L [ANL

    2010-01-01

    The recently developed contour method can measure 2-D, cross-sectional residual-stress map. A part is cut in two using a precise and low-stress cutting technique such as electric discharge machining. The contours of the new surfaces created by the cut, which will not be flat if residual stresses are relaxed by the cutting, are then measured and used to calculate the original residual stresses. The precise nature of the assumption about the cut is presented theoretically and is evaluated experimentally. Simply assuming a flat cut is overly restrictive and misleading. The critical assumption is that the width of the cut, when measured in the original, undeformed configuration of the body is constant. Stresses at the cut tip during cutting cause the material to deform, which causes errors. The effect of such cutting errors on the measured stresses is presented. The important parameters are quantified. Experimental procedures for minimizing these errors are presented. An iterative finite element procedure to correct for the errors is also presented. The correction procedure is demonstrated on experimental data from a steel beam that was plastically bent to put in a known profile of residual stresses.

  13. On the role of assumptions in cladistic biogeographical analyses

    Directory of Open Access Journals (Sweden)

    Charles Morphy Dias dos Santos

    2011-01-01

    Full Text Available The biogeographical Assumptions 0, 1, and 2 (respectively A0, A1 and A2 are theoretical terms used to interpret and resolve incongruence in order to find general areagrams. The aim of this paper is to suggest the use of A2 instead of A0 and A1 in solving uncertainties during cladistic biogeographical analyses. In a theoretical example, using Component Analysis and Primary Brooks Parsimony Analysis (primary BPA, A2 allows for the reconstruction of the true sequence of disjunction events within a hypothetical scenario, while A0 adds spurious area relationships. A0, A1 and A2 are interpretations of the relationships between areas, not between taxa. Since area relationships are not equivalent to cladistic relationships, it is inappropriate to use the distributional information of taxa to resolve ambiguous patterns in areagrams, as A0 does. Although ambiguity in areagrams is virtually impossible to explain, A2 is better and more neutral than any other biogeographical assumption.

  14. Economic Growth Assumptions in Climate and Energy Policy

    Directory of Open Access Journals (Sweden)

    Nir Y. Krakauer

    2014-03-01

    Full Text Available The assumption that the economic growth seen in recent decades will continue has dominated the discussion of future greenhouse gas emissions and the mitigation of and adaptation to climate change. Given that long-term economic growth is uncertain, the impacts of a wide range of growth trajectories should be considered. In particular, slower economic growth would imply that future generations will be relatively less able to invest in emissions controls or adapt to the detrimental impacts of climate change. Taking into consideration the possibility of economic slowdown therefore heightens the urgency of reducing greenhouse gas emissions now by moving to renewable energy sources, even if this incurs short-term economic cost. I quantify this counterintuitive impact of economic growth assumptions on present-day policy decisions in a simple global economy-climate model (Dynamic Integrated model of Climate and the Economy (DICE. In DICE, slow future growth increases the economically optimal present-day carbon tax rate and the utility of taxing carbon emissions, although the magnitude of the increase is sensitive to model parameters, including the rate of social time preference and the elasticity of the marginal utility of consumption. Future scenario development should specifically include low-growth scenarios, and the possibility of low-growth economic trajectories should be taken into account in climate policy analyses.

  15. DDH-like Assumptions Based on Extension Rings

    DEFF Research Database (Denmark)

    Cramer, Ronald; Damgård, Ivan Bjerre; Kiltz, Eike;

    2011-01-01

    generalized to use instead d-DDH, and we show in the generic group model that d-DDH is harder than DDH. This means that virtually any application of DDH can now be realized with the same (amortized) efficiency, but under a potentially weaker assumption. On the negative side, we also show that d-DDH, just like...... DDH, is easy in bilinear groups. This motivates our suggestion of a different type of assumption, the d-vector DDH problems (VDDH), which are based on f(X)= X^d, but with a twist to avoid the problems with reducible polynomials. We show in the generic group model that VDDH is hard in bilinear groups...... and that in fact the problems become harder with increasing d and hence form an infinite hierarchy. We show that hardness of VDDH implies CCA-secure encryption, efficient Naor-Reingold style pseudorandom functions, and auxiliary input secure encryption, a strong form of leakage resilience. This can be seen...

  16. Time derivatives of the spectrum: Relaxing the stationarity assumption

    Science.gov (United States)

    Prieto, G. A.; Thomson, D. J.; Vernon, F. L.

    2005-12-01

    Spectrum analysis of seismic waveforms has played a significant role towards the understanding of multiple aspects of Earth structure and earthquake source physics. In recent years the multitaper spectrum estimation approach (Thomson, 1982) has been applied to geophysical problems providing not only reliable estimates of the spectrum, but also estimates of spectral uncertainties (Thomson and Chave, 1991). However, these improved spectral estimates were developed under the assumption of local stationarity and provide an incomplete description of the observed process. It is obvious that due to the intrinsic attenuation of the Earth, the amplitudes, and thus the frequency contents are changing with time as waves pass through a seismic station. There have been incredible improvements in different techniques to analyze non-stationary signals, including wavelet decomposition, Wigner-Ville spectrum and the dual-frequency spectrum. We apply one of the recently developed techniques, the Quadratic Inverse Theory (Thomson, 1990, 1994), combined with the multitaper technique to look at the time derivatives of the spectrum. If the spectrum is reasonably white in a certain bandwidth, using QI theory, we can estimate the derivatives of the spectrum at each frequency. We test synthetic signals to corroborate the approach and apply it the records of small earthquakes at local distances. This is a first approach to try and combine the classical spectrum analysis without the assumption of stationarity that is generally taken.

  17. Relaxing the zero-sum assumption in neutral biodiversity theory.

    Science.gov (United States)

    Haegeman, Bart; Etienne, Rampal S

    2008-05-21

    The zero-sum assumption is one of the ingredients of the standard neutral model of biodiversity by Hubbell. It states that the community is saturated all the time, which in this model means that the total number of individuals in the community is constant over time, and therefore introduces a coupling between species abundances. It was shown recently that a neutral model with independent species, and thus without any coupling between species abundances, has the same sampling formula (given a fixed number of individuals in the sample) as the standard model [Etienne, R.S., Alonso, D., McKane, A.J., 2007. The zero-sum assumption in neutral biodiversity theory. J. Theor. Biol. 248, 522-536]. The equilibria of both models are therefore equivalent from a practical point of view. Here we show that this equivalence can be extended to a class of neutral models with density-dependence on the community-level. This result can be interpreted as robustness of the model, i.e. insensitivity of the model to the precise interaction of the species in a neutral community. It can also be interpreted as a lack of resolution, as different mechanisms of interactions between neutral species cannot be distinguished using only a single snapshot of species abundance data.

  18. Disease surveillance using a hidden Markov model

    Directory of Open Access Journals (Sweden)

    Wright Graeme

    2009-08-01

    Full Text Available Abstract Background Routine surveillance of disease notification data can enable the early detection of localised disease outbreaks. Although hidden Markov models (HMMs have been recognised as an appropriate method to model disease surveillance data, they have been rarely applied in public health practice. We aimed to develop and evaluate a simple flexible HMM for disease surveillance which is suitable for use with sparse small area count data and requires little baseline data. Methods A Bayesian HMM was designed to monitor routinely collected notifiable disease data that are aggregated by residential postcode. Semi-synthetic data were used to evaluate the algorithm and compare outbreak detection performance with the established Early Aberration Reporting System (EARS algorithms and a negative binomial cusum. Results Algorithm performance varied according to the desired false alarm rate for surveillance. At false alarm rates around 0.05, the cusum-based algorithms provided the best overall outbreak detection performance, having similar sensitivity to the HMMs and a shorter average time to detection. At false alarm rates around 0.01, the HMM algorithms provided the best overall outbreak detection performance, having higher sensitivity than the cusum-based Methods and a generally shorter time to detection for larger outbreaks. Overall, the 14-day HMM had a significantly greater area under the receiver operator characteristic curve than the EARS C3 and 7-day negative binomial cusum algorithms. Conclusion Our findings suggest that the HMM provides an effective method for the surveillance of sparse small area notifiable disease data at low false alarm rates. Further investigations are required to evaluation algorithm performance across other diseases and surveillance contexts.

  19. 'Hidden messages' emerging from Afrocentric management perspectives

    Directory of Open Access Journals (Sweden)

    H. Van den Heuvel

    2008-12-01

    Full Text Available Purpose: This paper aims to examine how 'African management' discourse has emerged in South Africa. Altogether, it has stimulated debates - sometimes in controversial ways - on 'taboo issues', e.g. relating to 'cultural diversity' and 'ethnicity'. The stimulation of such debates within organisations is probably a more valuable contribution than a static, essentialised 'African identity' that it proclaims. Design/Methodology/Approach: The paper draws on a qualitative research project conducted in South Africa in 2003-2004. Its relevance lies in gaining in-depth insights into ('non-western' local management discourse. It seeks to contribute to the body of knowledge on political and cultural contexts in which South African organizations operate, and how they impact on local management perspectives, and vice versa. Findings: The research findings make clear how and under what circumstances 'African management' discourse has come about in South Africa, and how it could be interpreted. Implications: 'African management' advocates allegedly attempt to revise dominant management thinking and promote 'humane-ness' and participatory decision-making in South African organisations, in search of a contextualised management approach. Amongst others, it has produced new meanings of 'Africanness' and has opened up space for 'hidden messages', resentments and aspirations to become openly articulated. This throws another light on phenomena such as cultural diversity and ethnicity that usually tend to be 'neutralised'. This may turn out to be far healthier for blooming organisational cultures in South Africa than relentlessly hammering on prescribed 'corporate values'. Originality/Value: This paper informs the reader in detail about the emergence and evolvement of 'African management' discourse in South Africa. It is a unique attempt to develop an interpretative viewpoint on this intriguing phenomenon that offers a potentially valuable contribution in reading

  20. Foundational Forces & Hidden Variables in Technology Commercialization

    Science.gov (United States)

    Barnett, Brandon

    2011-03-01

    The science of physics seems vastly different from the process of technology commercialization. Physics strives to understand our world through the experimental deduction of immutable laws and dependent variables and the resulting macro-scale phenomenon. In comparison, the~goal of business is to make a profit by addressing the needs, preferences, and whims of individuals in a market. It may seem that this environment is too dynamic to identify all the hidden variables and deduct the foundational forces that impact a business's ability to commercialize innovative technologies. One example of a business ``force'' is found in the semiconductor industry. In 1965, Intel co-founder Gordon Moore predicted that the number of transistors incorporated in a chip will approximately double every 24 months. Known as Moore's Law, this prediction has become the guiding principle for the semiconductor industry for the last 40 years. Of course, Moore's Law is not really a law of nature; rather it is the result of efforts by Intel and the entire semiconductor industry. A closer examination suggests that there are foundational principles of business that underlie the macro-scale phenomenon of Moore's Law. Principles of profitability, incentive, and strategic alignment have resulted in a coordinated influx of resources that has driven technologies to market, increasing the profitability of the semiconductor industry and optimizing the fitness of its participants. New innovations in technology are subject to these same principles. So, in addition to traditional market forces, these often unrecognized forces and variables create challenges for new technology commercialization. In this talk, I will draw from ethnographic research, complex adaptive theory, and industry data to suggest a framework with which to think about new technology commercialization. Intel's bio-silicon initiative provides a case study.

  1. Examining a Hidden Assumption of Bell's Theorem and Counterexamples to Bell's Theorem in the Space of All Paths for a Quantum System

    CERN Document Server

    Leffler, Warren

    2011-01-01

    This paper implements in a simple but rigorous fashion a model of particle interaction involving all paths within a quantum system, both for configuration space and for spin. The model, which we call the space of all paths, leads to a locally explicable conceptual framework for quantum mechanics. Using it we present two counterexamples to Bell's theorem. Moreover, we show that the result places severe constraints on possible viable interpretations of quantum mechanics: Either an interpretation must in some form represent a quantum system in terms of all paths within the system or, alternatively, the interpretation must harbor "action at a distance." We take action-at-a-distance as a reductio ad absurdum argument for our framework for quantum foundations, since any mechanism in which causal effects can operate instantaneously across vast distances would be completely unknown and magical, a near absurdity.

  2. On defining dietary fibre.

    Science.gov (United States)

    DeVries, Jonathan W

    2003-02-01

    Establishing a definition for dietary fibre has historically been a balance between nutrition knowledge and analytical method capabilities. While the most widely accepted physiologically-based definitions have generally been accurate in defining the dietary fibre in foods, scientists and regulators have tended, in practice, to rely on analytical procedures as the definitional basis in fact. As a result, incongruities between theory and practice have resulted in confusion regarding the components that make up dietary fibre. In November 1998 the president of the American Association of Cereal Chemists (AACC) appointed an expert scientific review committee and charged it with the task of reviewing and, if necessary, updating the definition of dietary fibre. The committee was further charged with assessing the state of analytical methodology and making recommendations relevant to the updated definition. After due deliberation, an updated definition of dietary fibre was delivered to the AACC Board of Directors for consideration and adoption (Anon, 2000; Jones 2000b). The updated definition includes the same food components as the historical working definition used for approximately 30 years (a very important point, considering that the majority of the research of the past 30 years delineating the positive health effects of dietary fibre is based on that working definition). However, the updated definition more clearly delineates the make-up of dietary fibre and its physiological functionality. As a result, relatively few changes will be necessary in analytical methodology. Current methodologies, in particular AACC-approved method of analysis 32-05 (Grami, 2000), Association of Official Analytical Chemists' official method of analysis 985.29 (Horwitz, 2000a) or AACC 32-07 (Grami, 2000) Association of Official Analytical Chemists 991.43 (Horwitz, 2000a) will continue to be sufficient and used for most foods. A small number of additional methods will be necessary to

  3. AdS/QCD approach to the scale-invariant extension of the standard model with a strongly interacting hidden sector

    Science.gov (United States)

    Hatanaka, Hisaki; Jung, Dong-Won; Ko, Pyungwon

    2016-08-01

    In this paper, we revisit a scale-invariant extension of the standard model (SM) with a strongly interacting hidden sector within AdS/QCD approach. Using the AdS/QCD, we reduce the number of input parameters to three, i.e. hidden pion decay constant, hidden pion mass and tan β that is defined as the ratio of the vacuum expectation values (VEV) of the singlet scalar field and the SM Higgs boson. As a result, our model has sharp predictability. We perform the phenomenological analysis of the hidden pions which is one of the dark matter (DM) candidates in this model. With various theoretical and experimental constraints we search for the allowed parameter space and find that both resonance and non-resonance solutions are possible. Some typical correlations among various observables such as thermal relic density of hidden pions, Higgs boson signal strengths and DM-nucleon cross section are investigated. We provide some benchmark points for experimental tests.

  4. Washing machines, driers and dishwashers. Background reports. Vol. 1: Basic assumptions and impact analyses

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1995-06-01

    Before analyzing wet appliances to establish a common European Union (EU) basis for defining efficiency in domestic wet appliances, a framework has to be set up. The first part of this Background Report deals with such a framework and with definitions, basic assumptions and test methods. The next sections give a short introduction on the framework of wet appliances and definitions taken from international standards. Chapter 2 elaborates on basic assumptions regarding appliance categories, capacity, energy efficiency and performance. Chapter 3 contains a survey of test methods from international standard and chapter 4 shows the present state of standard in International Standardization Organization (IEC) and Commite Europeen de Normalisation Electrotechnique (CENELEC). The next two chapter of the report deal with the user of wet appliances: the consumer. Analysis in more detail aspects of daily use, such as ownership level, frequency of use, type of programme used is given. An important question for this study is whether a `European consumer` exists; section 5.5 deals with this subject. Two elements of the marketing mix: product and price are considered. Several possible product options are reviewed and attention is paid to the impact of price on conumsers` buying decicions. The findings of this report and recommendations are summarized. (au)

  5. What lies beneath: underlying assumptions in bioimage analysis.

    Science.gov (United States)

    Pridmore, Tony P; French, Andrew P; Pound, Michael P

    2012-12-01

    The need for plant image analysis tools is established and has led to a steadily expanding literature and set of software tools. This is encouraging, but raises a question: how does a plant scientist with no detailed knowledge or experience of image analysis methods choose the right tool(s) for the task at hand, or satisfy themselves that a suggested approach is appropriate? We believe that too great an emphasis is currently being placed on low-level mechanisms and software environments. In this opinion article we propose that a renewed focus on the core theories and algorithms used, and in particular the assumptions upon which they rely, will better equip plant scientists to evaluate the available resources. Copyright © 2012 Elsevier Ltd. All rights reserved.

  6. Assumptions of Customer Knowledge Enablement in the Open Innovation Process

    Directory of Open Access Journals (Sweden)

    Jokubauskienė Raminta

    2017-08-01

    Full Text Available In the scientific literature, open innovation is one of the most effective means to innovate and gain a competitive advantage. In practice, there is a variety of open innovation activities, but, nevertheless, customers stand as the cornerstone in this area, since the customers’ knowledge is one of the most important sources of new knowledge and ideas. Evaluating the context where are the interactions of open innovation and customer knowledge enablement, it is necessary to take into account the importance of customer knowledge management. Increasingly it is highlighted that customers’ knowledge management facilitates the creation of innovations. However, it should be an examination of other factors that influence the open innovation, and, at the same time, customers’ knowledge management. This article presents a theoretical model, which reveals the assumptions of open innovation process and the impact on the firm’s performance.

  7. Cost and Performance Assumptions for Modeling Electricity Generation Technologies

    Energy Technology Data Exchange (ETDEWEB)

    Tidball, Rick [ICF International, Fairfax, VA (United States); Bluestein, Joel [ICF International, Fairfax, VA (United States); Rodriguez, Nick [ICF International, Fairfax, VA (United States); Knoke, Stu [ICF International, Fairfax, VA (United States)

    2010-11-01

    The goal of this project was to compare and contrast utility scale power plant characteristics used in data sets that support energy market models. Characteristics include both technology cost and technology performance projections to the year 2050. Cost parameters include installed capital costs and operation and maintenance (O&M) costs. Performance parameters include plant size, heat rate, capacity factor or availability factor, and plant lifetime. Conventional, renewable, and emerging electricity generating technologies were considered. Six data sets, each associated with a different model, were selected. Two of the data sets represent modeled results, not direct model inputs. These two data sets include cost and performance improvements that result from increased deployment as well as resulting capacity factors estimated from particular model runs; other data sets represent model input data. For the technologies contained in each data set, the levelized cost of energy (LCOE) was also evaluated, according to published cost, performance, and fuel assumptions.

  8. Decision-Theoretic Planning: Structural Assumptions and Computational Leverage

    CERN Document Server

    Boutilier, C; Hanks, S; 10.1613/jair.575

    2011-01-01

    Planning under uncertainty is a central problem in the study of automated sequential decision making, and has been addressed by researchers in many different fields, including AI planning, decision analysis, operations research, control theory and economics. While the assumptions and perspectives adopted in these areas often differ in substantial ways, many planning problems of interest to researchers in these fields can be modeled as Markov decision processes (MDPs) and analyzed using the techniques of decision theory. This paper presents an overview and synthesis of MDP-related methods, showing how they provide a unifying framework for modeling many classes of planning problems studied in AI. It also describes structural properties of MDPs that, when exhibited by particular classes of problems, can be exploited in the construction of optimal or approximately optimal policies or plans. Planning problems commonly possess structure in the reward and value functions used to describe performance criteria, in the...

  9. Cost and Performance Assumptions for Modeling Electricity Generation Technologies

    Energy Technology Data Exchange (ETDEWEB)

    Tidball, R.; Bluestein, J.; Rodriguez, N.; Knoke, S.

    2010-11-01

    The goal of this project was to compare and contrast utility scale power plant characteristics used in data sets that support energy market models. Characteristics include both technology cost and technology performance projections to the year 2050. Cost parameters include installed capital costs and operation and maintenance (O&M) costs. Performance parameters include plant size, heat rate, capacity factor or availability factor, and plant lifetime. Conventional, renewable, and emerging electricity generating technologies were considered. Six data sets, each associated with a different model, were selected. Two of the data sets represent modeled results, not direct model inputs. These two data sets include cost and performance improvements that result from increased deployment as well as resulting capacity factors estimated from particular model runs; other data sets represent model input data. For the technologies contained in each data set, the levelized cost of energy (LCOE) was also evaluated, according to published cost, performance, and fuel assumptions.

  10. Validating modelling assumptions of alpha particles in electrostatic turbulence

    CERN Document Server

    Wilkie, George; Highcock, Edmund; Dorland, William

    2014-01-01

    To rigorously model fast ions in fusion plasmas, a non-Maxwellian equilibrium distribution must be used. In the work, the response of high-energy alpha particles to electrostatic turbulence has been analyzed for several different tokamak parameters. Our results are consistent with known scalings and experimental evidence that alpha particles are generally well-confined: on the order of several seconds. It is also confirmed that the effect of alphas on the turbulence is negligible at realistically low concentrations, consistent with linear theory. It is demonstrated that the usual practice of using a high-temperature Maxwellian gives incorrect estimates for the radial alpha particle flux, and a method of correcting it is provided. Furthermore, we see that the timescales associated with collisions and transport compete at moderate energies, calling into question the assumption that alpha particles remain confined to a flux surface that is used in the derivation of the slowing-down distribution.

  11. Exploring gravitational statistics not based on quantum dynamical assumptions

    CERN Document Server

    Mandrin, P A

    2016-01-01

    Despite considerable progress in several approaches to quantum gravity, there remain uncertainties on the conceptual level. One issue concerns the different roles played by space and time in the canonical quantum formalism. This issue occurs because the Hamilton-Jacobi dynamics is being quantised. The question then arises whether additional physically relevant states could exist which cannot be represented in the canonical form or as a partition function. For this reason, the author has explored a statistical approach (NDA) which is not based on quantum dynamical assumptions and does not require space-time splitting boundary conditions either. For dimension 3+1 and under thermal equilibrium, NDA simplifies to a path integral model. However, the general case of NDA cannot be written as a partition function. As a test of NDA, one recovers general relativity at low curvature and quantum field theory in the flat space-time approximation. Related paper: arxiv:1505.03719.

  12. Posttraumatic Growth and Shattered World Assumptions Among Ex-POWs

    DEFF Research Database (Denmark)

    Lahav, Y.; Bellin, Elisheva S.; Solomon, Z.

    2016-01-01

    PTG and WAs. Method: Former prisoners of war (ex-POWs; n = 158) and comparable controls (n = 106) were assessed 38 years after the Yom Kippur War. Results: Ex-POWs endorsed more negative WAs and higher PTG and dissociation compared to controls. Ex-POWs with posttraumatic stress disorder (PTSD...... world assumptions (WAs) and that the co-occurrence of high PTG and negative WAs among trauma survivors reflects reconstruction of an integrative belief system. The present study aimed to test these claims by investigating, for the first time, the mediating role of dissociation in the relation between......) endorsed negative WAs and a higher magnitude of PTG and dissociation, compared to both ex-POWs without PTSD and controls. WAs were negatively correlated with dissociation and positively correlated with PTG. PTG was positively correlated with dissociation. Moreover, dissociation fully mediated...

  13. Linear irreversible heat engines based on local equilibrium assumptions

    Science.gov (United States)

    Izumida, Yuki; Okuda, Koji

    2015-08-01

    We formulate an endoreversible finite-time Carnot cycle model based on the assumptions of local equilibrium and constant energy flux, where the efficiency and the power are expressed in terms of the thermodynamic variables of the working substance. By analyzing the entropy production rate caused by the heat transfer in each isothermal process during the cycle, and using the endoreversible condition applied to the linear response regime, we identify the thermodynamic flux and force of the present system and obtain a linear relation that connects them. We calculate the efficiency at maximum power in the linear response regime by using the linear relation, which agrees with the Curzon-Ahlborn (CA) efficiency known as the upper bound in this regime. This reason is also elucidated by rewriting our model into the form of the Onsager relations, where our model turns out to satisfy the tight-coupling condition leading to the CA efficiency.

  14. The Impact of Modeling Assumptions in Galactic Chemical Evolution Models

    CERN Document Server

    Côté, Benoit; Ritter, Christian; Herwig, Falk; Venn, Kim A

    2016-01-01

    We use the OMEGA galactic chemical evolution code to investigate how the assumptions used for the treatment of galactic inflows and outflows impact numerical predictions. The goal is to determine how our capacity to reproduce the chemical evolution trends of a galaxy is affected by the choice of implementation used to include those physical processes. In pursuit of this goal, we experiment with three different prescriptions for galactic inflows and outflows and use OMEGA within a Markov Chain Monte Carlo code to recover the set of input parameters that best reproduces the chemical evolution of nine elements in the dwarf spheroidal galaxy Sculptor. Despite their different degrees of intended physical realism, we found that all three prescriptions can reproduce in an almost identical way the stellar abundance trends observed in Sculptor. While the three models have the same capacity to fit the data, the best values recovered for the parameters controlling the number of Type Ia supernovae and the strength of gal...

  15. New media in strategy – mapping assumptions in the field

    DEFF Research Database (Denmark)

    Gulbrandsen, Ib Tunby; Plesner, Ursula; Raviola, Elena

    2017-01-01

    in relation to the outside or the inside of the organization. After discussing the literature according to these dimensions (deterministic/volontaristic) and (internal/external), the article argues for a sociomaterial approach to strategy and strategy making and for using the concept of affordances......There is plenty of empirical evidence for claiming that new media make a difference for how strategy is conceived and executed. Furthermore, there is a rapidly growing body of literature that engages with this theme, and offers recommendations regarding the appropriate strategic actions in relation...... to new media. By contrast, there is relatively little attention to the assumptions behind strategic thinking in relation to new media. This article reviews the most influential strategy journals, asking how new media are conceptualized. It is shown that strategy scholars have a tendency to place...

  16. Experimental assessment of unvalidated assumptions in classical plasticity theory.

    Energy Technology Data Exchange (ETDEWEB)

    Brannon, Rebecca Moss (University of Utah, Salt Lake City, UT); Burghardt, Jeffrey A. (University of Utah, Salt Lake City, UT); Bauer, Stephen J.; Bronowski, David R.

    2009-01-01

    This report investigates the validity of several key assumptions in classical plasticity theory regarding material response to changes in the loading direction. Three metals, two rock types, and one ceramic were subjected to non-standard loading directions, and the resulting strain response increments were displayed in Gudehus diagrams to illustrate the approximation error of classical plasticity theories. A rigorous mathematical framework for fitting classical theories to the data, thus quantifying the error, is provided. Further data analysis techniques are presented that allow testing for the effect of changes in loading direction without having to use a new sample and for inferring the yield normal and flow directions without having to measure the yield surface. Though the data are inconclusive, there is indication that classical, incrementally linear, plasticity theory may be inadequate over a certain range of loading directions. This range of loading directions also coincides with loading directions that are known to produce a physically inadmissible instability for any nonassociative plasticity model.

  17. Tank waste remediation system retrieval and disposal mission key enabling assumptions

    Energy Technology Data Exchange (ETDEWEB)

    Baldwin, J.H.

    1998-01-09

    An overall systems approach has been applied to develop action plans to support the retrieval and immobilization waste disposal mission. The review concluded that the systems and infrastructure required to support the mission are known. Required systems are either in place or plans have been developed. An analysis of the programmatic, management and technical activities necessary to declare Readiness to Proceed with execution of the mission demonstrates that the system, people, and hardware will be on line and ready to support the private contractors. The systems approach included defining the retrieval and immobilized waste disposal mission requirements and evaluating the readiness of the TWRS contractor to supply waste feed to the private contractors in June 2002. The Phase 1 feed delivery requirements from the Private Contractor Request for Proposals were reviewed, transfer piping routes were mapped on it, existing systems were evaluated, and upgrade requirements were defined. Technical Basis Reviews were completed to define work scope in greater detail, cost estimates and associated year by year financial analyses were completed. Personnel training, qualifications, management systems and procedures were reviewed and shown to be in place and ready to support the Phase 1B mission. Key assumptions and risks that could negatively impact mission success were evaluated and appropriate mitigative actions plans were planned and scheduled.

  18. Hidden Gauge Structure of Supersymmetric Free Differential Algebras

    CERN Document Server

    Andrianopoli, L; Ravera, L

    2016-01-01

    The aim of this paper is to clarify the role of the nilpotent fermionic generator Q' introduced in Ref. [3] and appearing in the hidden supergroup underlying the free differential algebra (FDA) of D=11 supergravity. We give a physical explanation of its role by looking at the gauge properties of the theory. We find that its presence is necessary, in order that the extra 1-forms of the hidden supergroup give rise to the correct gauge transformations of the p-forms of the FDA. This interpretation is actually valid for any supergravity containing antisymmetric tensor fields, and any supersymmetric FDA can always be traded for a hidden Lie superalgebra containing extra fermionic nilpotent generators. As an interesting example we construct the hidden superalgebra associated with the FDA of N=2, D=7 supergravity. In this case we are able to parametrize the mutually non local 2- and 3-form B^(2) and B^(3) in terms of hidden 1-forms and find that supersymmetry and gauge invariance require in general the presence of t...

  19. Evidence Feed Forward Hidden Markov Model: A New Type of Hidden Markov Model

    CERN Document Server

    DelRose, Michael; Frederick, Philip; 10.5121/ijaia.2011.2101

    2011-01-01

    The ability to predict the intentions of people based solely on their visual actions is a skill only performed by humans and animals. The intelligence of current computer algorithms has not reached this level of complexity, but there are several research efforts that are working towards it. With the number of classification algorithms available, it is hard to determine which algorithm works best for a particular situation. In classification of visual human intent data, Hidden Markov Models (HMM), and their variants, are leading candidates. The inability of HMMs to provide a probability in the observation to observation linkages is a big downfall in this classification technique. If a person is visually identifying an action of another person, they monitor patterns in the observations. By estimating the next observation, people have the ability to summarize the actions, and thus determine, with pretty good accuracy, the intention of the person performing the action. These visual cues and linkages are important...

  20. Hidden Statistics Approach to Quantum Simulations

    Science.gov (United States)

    Zak, Michail

    2010-01-01

    Recent advances in quantum information theory have inspired an explosion of interest in new quantum algorithms for solving hard computational (quantum and non-quantum) problems. The basic principle of quantum computation is that the quantum properties can be used to represent structure data, and that quantum mechanisms can be devised and built to perform operations with this data. Three basic non-classical properties of quantum mechanics superposition, entanglement, and direct-product decomposability were main reasons for optimism about capabilities of quantum computers that promised simultaneous processing of large massifs of highly correlated data. Unfortunately, these advantages of quantum mechanics came with a high price. One major problem is keeping the components of the computer in a coherent state, as the slightest interaction with the external world would cause the system to decohere. That is why the hardware implementation of a quantum computer is still unsolved. The basic idea of this work is to create a new kind of dynamical system that would preserve the main three properties of quantum physics superposition, entanglement, and direct-product decomposability while allowing one to measure its state variables using classical methods. In other words, such a system would reinforce the advantages and minimize limitations of both quantum and classical aspects. Based upon a concept of hidden statistics, a new kind of dynamical system for simulation of Schroedinger equation is proposed. The system represents a modified Madelung version of Schroedinger equation. It preserves superposition, entanglement, and direct-product decomposability while allowing one to measure its state variables using classical methods. Such an optimal combination of characteristics is a perfect match for simulating quantum systems. The model includes a transitional component of quantum potential (that has been overlooked in previous treatment of the Madelung equation). The role of the

  1. Riboswitch Detection Using Profile Hidden Markov Models

    Directory of Open Access Journals (Sweden)

    Krishnamachari A

    2009-10-01

    Full Text Available Abstract Background Riboswitches are a type of noncoding RNA that regulate gene expression by switching from one structural conformation to another on ligand binding. The various classes of riboswitches discovered so far are differentiated by the ligand, which on binding induces a conformational switch. Every class of riboswitch is characterized by an aptamer domain, which provides the site for ligand binding, and an expression platform that undergoes conformational change on ligand binding. The sequence and structure of the aptamer domain is highly conserved in riboswitches belonging to the same class. We propose a method for fast and accurate identification of riboswitches using profile Hidden Markov Models (pHMM. Our method exploits the high degree of sequence conservation that characterizes the aptamer domain. Results Our method can detect riboswitches in genomic databases rapidly and accurately. Its sensitivity is comparable to the method based on the Covariance Model (CM. For six out of ten riboswitch classes, our method detects more than 99.5% of the candidates identified by the much slower CM method while being several hundred times faster. For three riboswitch classes, our method detects 97-99% of the candidates relative to the CM method. Our method works very well for those classes of riboswitches that are characterized by distinct and conserved sequence motifs. Conclusion Riboswitches play a crucial role in controlling the expression of several prokaryotic genes involved in metabolism and transport processes. As more and more new classes of riboswitches are being discovered, it is important to understand the patterns of their intra and inter genomic distribution. Understanding such patterns will enable us to better understand the evolutionary history of these genetic regulatory elements. However, a complete picture of the distribution pattern of riboswitches will emerge only after accurate identification of riboswitches across genomes

  2. Hidden beauty baryon states in the local hidden gauge approach with heavy quark spin symmetry

    Energy Technology Data Exchange (ETDEWEB)

    Xiao, C.W.; Oset, E. [Centro Mixto Universidad de Valencia-CSIC, Institutos de Investigacion de Paterna, Departamento de Fisica Teorica and IFIC, Valencia (Spain)

    2013-11-15

    Using a coupled-channel unitary approach, combining the heavy quark spin symmetry and the dynamics of the local hidden gauge, we investigate the meson-baryon interaction with hidden beauty and obtain several new states of N around 11 GeV. We consider the basis of states {eta}{sub b} N, {Upsilon};N, B {Lambda}{sub b}, B {Sigma}{sub b}, B{sup *}{Lambda}{sub b}, B{sup *}{Sigma}{sub b}, B{sup *}{Sigma}{sub b}{sup *} and find four basic bound states which correspond to B {Sigma}{sub b}, B {Sigma}{sub b}{sup *}, B{sup *}{Sigma}{sub b} and B{sup *}{Sigma}{sub b}{sup *}, decaying mostly into {eta}{sub b} N and {Upsilon}N and with a binding energy about 50-130 MeV with respect to the thresholds of the corresponding channel. All of them have isospin I = 1/2, and we find no bound states or resonances in I = 3/2. The B {Sigma}{sub b} state appears in J = 1/2, the B {Sigma}{sub b}{sup *} in J = 3/2, the B{sup *}{Sigma}{sub b} appears nearly degenerate in J = 1/2, 3/2 and the B{sup *}{Sigma}{sub b}{sup *} appears nearly degenerate in J = 1/2, 3/2, 5/2. These states have a width from 2-110 MeV, with conservative estimates of uncertainties, except for the one in J = 5/2 which has zero width since it cannot decay into any of the states of the basis chosen. We make generous estimates of the uncertainties and find that within very large margins these states appear bound. (orig.)

  3. Evidence Feed Forward Hidden Markov Model: A New Type Of Hidden Markov Model

    Directory of Open Access Journals (Sweden)

    Michael Del Rose

    2011-01-01

    Full Text Available The ability to predict the intentions of people based solely on their visual actions is a skill only performed by humans and animals. The intelligence of current computer algorithms has not reached this level of complexity, but there are several research efforts that are working towards it. With the number of classification algorithms available, it is hard to determine which algorithm works best for a particular situation. In classification of visual human intent data, Hidden Markov Models (HMM, and their variants, are leading candidates. The inability of HMMs to provide a probability in the observation to observation linkages is a big downfall in this classification technique. If a person is visually identifying an action of another person, they monitor patterns in the observations. By estimating the next observation, people have the ability to summarize the actions, and thus determine, with pretty good accuracy, the intention of the person performing the action. These visual cues and linkages are important in creating intelligent algorithms for determining human actions based on visual observations. The Evidence Feed Forward Hidden Markov Model is a newly developed algorithm which provides observation to observation linkages. The following research addresses the theory behind Evidence Feed Forward HMMs, provides mathematical proofs of their learning of these parameters to optimize the likelihood of observations with a Evidence Feed Forwards HMM, which is important in all computational intelligence algorithm, and gives comparative examples with standard HMMs in classification of both visual action data and measurement data; thus providing a strong base for Evidence Feed Forward HMMs in classification of many types of problems.

  4. Defining and Distinguishing Secular and Religious Terrorism

    Directory of Open Access Journals (Sweden)

    Heather S. Gregg

    2014-04-01

    Full Text Available Religious terrorism is typically characterised as acts of unrestrained, irrational and indiscriminant violence, thus offering few if any policy options for counterterrorism measures. This assumption about religious terrorism stems from two challenges in the literature: disproportionate attention to apocalyptic terrorism, and a lack of distinction between religious terrorism and its secular counterpart. This article, therefore, aims to do four things: define and differentiate religiously motivated terrorism from traditional terrorism; investigate three goals of religious terrorism (fomenting the apocalypse, creating a religious government, and establishing a religiously pure state; consider the role of leadership and target selection of religious terrorists; and, finally, suggest a range of counterterrorism strategies based on these observations.

  5. Recent Progress in Search for Hidden/Dark Photon

    CERN Document Server

    Deliyergiyev, M A

    2015-01-01

    We will try to communicate the many difficulties that we encounter when attempting to pinpoint a common origin for the several observed anomalies, or assessing their tension with existing exclusion limits. These include systematics affecting the operation of the detectors, our knowledge of their response, astrophysical uncertainties, and the broad range of particle couplings that can mediate the interaction with a detector target. The interesting astrophysical evidence that motivates a search for dark-photon and focuses our attention on a Hidden Valleys model with a GeV-scale dark sector that produces the exciting signatures, which may include the possible constituent of dark matter, the possible existence of extra gauge groups. Results from the recent underground experiments are also considered. Many models of new physics beyond the Standard Model contain a 'light' hidden sector (dark sector) with a colorful spectrum of new particles. Recently, it has been shown that the hidden sector can give rise to unique...

  6. Applications of hidden symmetries to black hole physics

    Energy Technology Data Exchange (ETDEWEB)

    Frolov, Valeri, E-mail: vfrolov@ualberta.ca [Institute of Theoretical Physics, Department of Physics University of Alberta, Edmonton, Alberta, T6G 2G7 (Canada)

    2011-02-01

    This work is a brief review of applications of hidden symmetries to black hole physics. Symmetry is one of the most important concepts of the science. In physics and mathematics the symmetry allows one to simplify a problem, and often to make it solvable. According to the Noether theorem symmetries are responsible for conservation laws. Besides evident (explicit) spacetime symmetries, responsible for conservation of energy, momentum, and angular momentum of a system, there also exist what is called hidden symmetries, which are connected with higher order in momentum integrals of motion. A remarkable fact is that black holes in four and higher dimensions always possess a set ('tower') of explicit and hidden symmetries which make the equations of motion of particles and light completely integrable. The paper gives a general review of the recently obtained results. The main focus is on understanding why at all black holes have something (symmetry) to hide.

  7. The hidden-charm pentaquark and tetraquark states

    CERN Document Server

    Chen, Hua-Xing; Liu, Xiang; Zhu, Shi-Lin

    2016-01-01

    In the past decade many charmonium-like states were observed experimentally. Especially those charged charmonium-like $Z_c$ states and bottomonium-like $Z_b$ states can not be accommodated within the naive quark model. These charged $Z_c$ states are good candidates of either the hidden-charm tetraquark states or molecules composed of a pair of charmed mesons. Recently, the LHCb Collaboration discovered two hidden-charm pentaquark states, which are also beyond the quark model. In this work, we review the current experimental progress and investigate various theoretical interpretations of these candidates of the multiquark states. We list the puzzles and theoretical challenges of these models when confronted with the experimental data. We also discuss possible future measurements which may distinguish the theoretical schemes on the underlying structures of the hidden-charm multiquark states.

  8. Applications of hidden symmetries to black hole physics

    CERN Document Server

    Frolov, Valeri

    2010-01-01

    This work is a brief review of applications of hidden symmetries to black hole physics. Symmetry is one of the most important concepts of the science. In physics and mathematics the symmetry allows one to simplify a problem, and often to make it solvable. According to the Noether theorem symmetries are responsible for conservation laws. Besides evident (explicit) spacetime symmetries, responsible for conservation of energy, momentum, and angular momentum of a system, there also exist what is called hidden symmetries, which are connected with higher order in momentum integrals of motion. A remarkable fact is that black holes in four and higher dimensions always possess a set (`tower') of explicit and hidden symmetries which make the equations of motion of particles and light completely integrable. The paper gives a general review of the recently obtained results. The main focus is on understanding why at all black holes have something (symmetry) to hide.

  9. Using the hidden curriculum to teach professionalism in nursing students.

    Science.gov (United States)

    Karimi, Zohreh; Ashktorab, Tahereh; Mohammadi, Easa; Abedi, Heidar Ali

    2014-03-01

    Professionalism in nursing is critical for creating credibility and a positive image. This study was carried out to explain the use of hidden curriculum in teaching professionalism in nursing students. This qualitative study was conducted through purposeful sampling strategy by the participation of 32 nursing students. The data were collected by using semi-structured interviews, and this process was continued until achieving data saturation and themes' emergence. Content analysis method was used for data analysis. DATA ANALYSIS REVEALED THREE MAIN THEMES: Development of understanding the professionalism elements, Variety of influenceability strategies, and Influenceability to various resources. Each theme consisted of some subthemes. The nursing students learnt the professionalism elements by different methods from different resources through the hidden curriculum. Therefore, exploration of the currently administered hidden curricula is suggested.

  10. Testing the habituation assumption underlying models of parasitoid foraging behavior

    NARCIS (Netherlands)

    Abram, Paul K.; Cusumano, Antonino; Abram, Katrina; Colazza, Stefano; Peri, Ezio

    2017-01-01

    Background. Habituation, a form of non-associative learning, has several well-defined characteristics that apply to a wide range of physiological and behavioral responses in many organisms. In classic patch time allocation models, habituation is considered to be a major mechanistic component of para

  11. QCD sum rule study of hidden-charm pentaquarks

    Energy Technology Data Exchange (ETDEWEB)

    Chen, Hua-Xing; Cui, Er-Liang [Beihang University, School of Physics and Beijing Key Laboratory of Advanced Nuclear Materials and Physics, Beijing (China); Chen, Wei; Steele, T.G. [University of Saskatchewan, Department of Physics and Engineering Physics, Saskatoon, Saskatchewan (Canada); Liu, Xiang [Lanzhou University, School of Physical Science and Technology, Lanzhou (China); Lanzhou University and Institute of Modern Physics of CAS, Research Center for Hadron and CSR Physics, Lanzhou (China); Zhu, Shi-Lin [Peking University, School of Physics and State Key Laboratory of Nuclear Physics and Technology, Beijing (China); Collaborative Innovation Center of Quantum Matter, Beijing (China); Peking University, Center of High Energy Physics, Beijing (China)

    2016-10-15

    We study the mass spectra of hidden-charm pentaquarks having spin J = (1)/(2)/(3)/(2)/(5)/(2) and quark contents uudc anti c. We systematically construct all the relevant local hidden-charm pentaquark currents, and we select some of them to perform QCD sum rule analyses. We find that the P{sub c}(4380) and P{sub c}(4450) can be identified as hidden-charm pentaquark states composed of an anti-charmed meson and a charmed baryon. Besides them, we also find (a) the lowest-lying hidden-charm pentaquark state of J{sup P} = 1/2{sup -} has the mass 4.33{sup +0.17}{sub -0.13} GeV, while the one of J{sup P} = 1/2{sup +} is significantly higher, that is, around 4.7-4.9 GeV; (b) the lowest-lying hidden-charm pentaquark state of J{sup P} = 3/2{sup -} has the mass 4.37{sup +0.18}{sub -0.13} GeV, consistent with the P{sub c}(4380) of J{sup P} = 3/2{sup -}, while the one of J{sup P} = 3/2{sup +} is also significantly higher, that is, above 4.6 GeV; (c) the hidden-charm pentaquark state of J{sup P} = 5/2{sup -} has a mass around 4.5-4.6 GeV, slightly larger than the P{sub c}(4450) of J{sup P} = 5/2{sup +}. (orig.)

  12. Performance based analysis of hidden beams in reinforced concrete structures

    Directory of Open Access Journals (Sweden)

    Helou Samir H.

    2014-01-01

    Full Text Available Local and perhaps regional vernacular reinforced concrete building construction leans heavily against designing slabs with imbedded hidden beams for flooring systems in most structures including major edifices. The practice is distinctive in both framed and in shear wall structures. Hidden beams are favoured structural elements due to their many inherent features that characterize them; they save on floor height clearance; they also save on formwork, labour and material cost. Moreover, hidden beams form an acceptable aesthetic appearance that does not hinder efficient interior space partitioning. Such beams have the added advantage of clearing the way for horizontal electromechanical ductwork. However, seismic considerations, in all likelihood, are seldom seriously addressed. The mentioned structural system of shallow beams is adopted in ribbed slabs, waffle slabs and at times with solid slabs. Ribbed slabs and waffle slabs are more prone to hidden beam inclusion due to the added effective height of the concrete section. Due to the presence of a relatively high reinforcement ratio at the joints the sections at such location tend to become less ductile with unreliable contribution to spandrel force resistance. In the following study the structural influence of hidden beams within slabs is investigated. With the primary focus on a performance based analysis of such elements within a structure. This is investigated with due attention to shear wall contribution to the overall behaviour of such structures. Numerical results point in the direction that the function of hidden beams is not as adequate as desired. Therefore it is strongly believed that they are generally superfluous and maybe eliminated altogether. Conversely, shallow beams seem to render the overall seismic capacity of the structure unreliable. Since such an argument is rarely manifested within the linear analysis domain; a pushover analysis exercise is thus mandatory for behaviour

  13. The Impact of Modeling Assumptions in Galactic Chemical Evolution Models

    Science.gov (United States)

    Côté, Benoit; O'Shea, Brian W.; Ritter, Christian; Herwig, Falk; Venn, Kim A.

    2017-02-01

    We use the OMEGA galactic chemical evolution code to investigate how the assumptions used for the treatment of galactic inflows and outflows impact numerical predictions. The goal is to determine how our capacity to reproduce the chemical evolution trends of a galaxy is affected by the choice of implementation used to include those physical processes. In pursuit of this goal, we experiment with three different prescriptions for galactic inflows and outflows and use OMEGA within a Markov Chain Monte Carlo code to recover the set of input parameters that best reproduces the chemical evolution of nine elements in the dwarf spheroidal galaxy Sculptor. This provides a consistent framework for comparing the best-fit solutions generated by our different models. Despite their different degrees of intended physical realism, we found that all three prescriptions can reproduce in an almost identical way the stellar abundance trends observed in Sculptor. This result supports the similar conclusions originally claimed by Romano & Starkenburg for Sculptor. While the three models have the same capacity to fit the data, the best values recovered for the parameters controlling the number of SNe Ia and the strength of galactic outflows, are substantially different and in fact mutually exclusive from one model to another. For the purpose of understanding how a galaxy evolves, we conclude that only reproducing the evolution of a limited number of elements is insufficient and can lead to misleading conclusions. More elements or additional constraints such as the Galaxy’s star-formation efficiency and the gas fraction are needed in order to break the degeneracy between the different modeling assumptions. Our results show that the successes and failures of chemical evolution models are predominantly driven by the input stellar yields, rather than by the complexity of the Galaxy model itself. Simple models such as OMEGA are therefore sufficient to test and validate stellar yields. OMEGA

  14. Reheating the Standard Model from a hidden sector

    Science.gov (United States)

    Tenkanen, Tommi; Vaskonen, Ville

    2016-10-01

    We consider a scenario where the inflaton decays to a hidden sector thermally decoupled from the visible Standard Model sector. A tiny portal coupling between the hidden and the visible sectors later heats the visible sector so that the Standard Model degrees of freedom come to dominate the energy density of the Universe before big bang nucleosynthesis. We find that this scenario is viable, although obtaining the correct dark matter abundance and retaining successful big bang nucleosynthesis is not obvious. We also show that the isocurvature perturbations constituted by a primordial Higgs condensate are not problematic for the viability of the scenario.

  15. On Noncontextual, Non-Kolmogorovian Hidden Variable Theories

    Science.gov (United States)

    Feintzeig, Benjamin H.; Fletcher, Samuel C.

    2017-01-01

    One implication of Bell's theorem is that there cannot in general be hidden variable models for quantum mechanics that both are noncontextual and retain the structure of a classical probability space. Thus, some hidden variable programs aim to retain noncontextuality at the cost of using a generalization of the Kolmogorov probability axioms. We generalize a theorem of Feintzeig (Br J Philos Sci 66(4): 905-927, 2015) to show that such programs are committed to the existence of a finite null cover for some quantum mechanical experiments, i.e., a finite collection of probability zero events whose disjunction exhausts the space of experimental possibilities.

  16. Dynamically Generated Open and Hidden Charm Meson Systems

    CERN Document Server

    Gamermann, D; Strottman, D D; Vacas, M J V

    2006-01-01

    The lowest order chiral Lagrangian successfully applied to study the interaction of the SU(3) octet of pseudo-scalar mesons is generalized to include all mesons from the SU(4) 15-plet of pseudo-scalar mesons. Exchanges of heavy vector mesons, which are indirectly taken into account via this approach, are suppressed. Unitarization in coupled channels leads to dynamical generation of resonances in the open and hidden charm sectors. In particular, for reasonable values of the input, a new narrow scalar resonance in the hidden charm sector appears with a mass of 3.7 GeV.

  17. Reheating the Standard Model from a Hidden Sector

    CERN Document Server

    Tenkanen, Tommi

    2016-01-01

    We consider a scenario where the inflaton decays to a hidden sector thermally decoupled from the visible Standard Model sector. A tiny portal coupling between the hidden and the visible sectors later heats the visible sector so that the Standard Model degrees of freedom come to dominate the energy density of the Universe before Big Bang Nucleosynthesis. We find that this scenario is viable, although obtaining the correct dark matter abundance and retaining successful Big Bang Nucleosynthesis is not obvious. We also show that the isocurvature perturbations constituted by a primordial Higgs condensate are not problematic for the viability of the scenario.

  18. On Noncontextual, Non-Kolmogorovian Hidden Variable Theories

    Science.gov (United States)

    Feintzeig, Benjamin H.; Fletcher, Samuel C.

    2017-02-01

    One implication of Bell's theorem is that there cannot in general be hidden variable models for quantum mechanics that both are noncontextual and retain the structure of a classical probability space. Thus, some hidden variable programs aim to retain noncontextuality at the cost of using a generalization of the Kolmogorov probability axioms. We generalize a theorem of Feintzeig (Br J Philos Sci 66(4): 905-927, 2015) to show that such programs are committed to the existence of a finite null cover for some quantum mechanical experiments, i.e., a finite collection of probability zero events whose disjunction exhausts the space of experimental possibilities.

  19. Image Coding using Markov Models with Hidden States

    DEFF Research Database (Denmark)

    Forchhammer, Søren Otto

    1999-01-01

    The Cylinder Partially Hidden Markov Model (CPH-MM) is applied to lossless coding of bi-level images. The original CPH-MM is relaxed for the purpose of coding by not imposing stationarity, but otherwise the model description is the same.......The Cylinder Partially Hidden Markov Model (CPH-MM) is applied to lossless coding of bi-level images. The original CPH-MM is relaxed for the purpose of coding by not imposing stationarity, but otherwise the model description is the same....

  20. How to Find a Hidden World at the LHC

    CERN Document Server

    Wells, James D

    2008-01-01

    I discuss how the Large Hadron Collider era should broaden our view of particle physics research, and apply this thinking to the case of Hidden Worlds. I focus on one of the simplest representative cases of a Hidden World, and detail the rich implications it has for LHC physics, including universal suppression of Higgs boson production, trans-TeV heavy Higgs boson signatures, heavy-to-light Higgs boson decays, weakly coupled exotic gauge bosons, and Higgs boson decays to four fermions via light exotic gauge bosons. Some signatures may be accessible in the very early stages of collider operation, whereas others motivate a later high-lumonosity upgrade.

  1. Fuzzy Modeled K-Cluster Quality Mining of Hidden Knowledge for Decision Support

    Directory of Open Access Journals (Sweden)

    S. Parkash  Kumar

    2011-01-01

    Full Text Available Problem statement: The work presented Fuzzy Modeled K-means Cluster Quality Mining of hidden knowledge for Decision Support. Based on the number of clusters, number of objects in each cluster and its cohesiveness, precision and recall values, the cluster quality metrics is measured. The fuzzy k-means is adapted approach by using heuristic method which iterates the cluster to form an efficient valid cluster. With the obtained data clusters, quality assessment is made by predictive mining using decision tree model. Validation criteria focus on the quality metrics of the institution features for cluster formation and handle efficiently the arbitrary shaped clusters. Approach: The proposed work presented a fuzzy k-means cluster algorithm in the formation of student, faculty and infrastructural clusters based on the performance, skill set and facilitation availability respectively. The knowledge hidden among the educational data set is extracted through Fuzzy k-means cluster an unsupervised learning depends on certain initiation values to define the subgroups present in the data set. Results: Based on the features of the dataset and input parameters cluster formation vary, which motivates the clarification of cluster validity. The results of quality indexed fuzzy k-means shows better cluster validation compared to that of traditional k-family algorithm. Conclusion: The experimental results of cluster validation scheme confirm the reliability of validity index showing that it performs better than other k-family clusters.

  2. Hidden markov model for the prediction of transmembrane proteins using MATLAB.

    Science.gov (United States)

    Chaturvedi, Navaneet; Shanker, Sudhanshu; Singh, Vinay Kumar; Sinha, Dhiraj; Pandey, Paras Nath

    2011-01-01

    Since membranous proteins play a key role in drug targeting therefore transmembrane proteins prediction is active and challenging area of biological sciences. Location based prediction of transmembrane proteins are significant for functional annotation of protein sequences. Hidden markov model based method was widely applied for transmembrane topology prediction. Here we have presented a revised and a better understanding model than an existing one for transmembrane protein prediction. Scripting on MATLAB was built and compiled for parameter estimation of model and applied this model on amino acid sequence to know the transmembrane and its adjacent locations. Estimated model of transmembrane topology was based on TMHMM model architecture. Only 7 super states are defined in the given dataset, which were converted to 96 states on the basis of their length in sequence. Accuracy of the prediction of model was observed about 74 %, is a good enough in the area of transmembrane topology prediction. Therefore we have concluded the hidden markov model plays crucial role in transmembrane helices prediction on MATLAB platform and it could also be useful for drug discovery strategy. The database is available for free at bioinfonavneet@gmail.comvinaysingh@bhu.ac.in.

  3. LDA Based Face Recognition by Using Hidden Markov Model in Current Trends

    Directory of Open Access Journals (Sweden)

    S.Sharavanan

    2009-10-01

    Full Text Available Hidden Markov model (HMM is a promising method that works well for images with variations in lighting, facial expression, and orientation. Face recognition draws attention as a complex task due to noticeable changes produced on appearance by illumination, facial expression, size, orientation and other external factors. To process images using HMM, the temporal or space sequences are to be considered. In simple terms HMM can be defined as set of finite states with associated probability distributions. Only the outcome is visible to the external user not the states and hence the name Hidden Markov Model. The paper deals with various techniques and methodologies used for resolving the problem .We discuss about appearance based, feature based, model based and hybrid methods for face identification. Conventional techniques such as Principal Component Analysis (PCA, Linear Discriminant Analysis (LDA, Independent Component Analysis (ICA, and feature based Elastic Bunch Graph Matching (EBGM and 2D and 3D face models are well-known for face detection and recognition.

  4. Weak convergence of Jacobian determinants under asymmetric assumptions

    Directory of Open Access Journals (Sweden)

    Teresa Alberico

    2012-05-01

    Full Text Available Let $\\Om$ be a bounded open set in $\\R^2$ sufficiently smooth and $f_k=(u_k,v_k$ and $f=(u,v$ mappings belong to the Sobolev space $W^{1,2}(\\Om,\\R^2$. We prove that if the sequence of Jacobians $J_{f_k}$ converges to a measure $\\mu$ in sense of measures andif one allows different assumptions on the two components of $f_k$ and $f$, e.g.$$u_k \\rightharpoonup u \\;\\;\\mbox{weakly in} \\;\\; W^{1,2}(\\Om \\qquad \\, v_k \\rightharpoonup v \\;\\;\\mbox{weakly in} \\;\\; W^{1,q}(\\Om$$for some $q\\in(1,2$, then\\begin{equation}\\label{0}d\\mu=J_f\\,dz.\\end{equation}Moreover, we show that this result is optimal in the sense that conclusion fails for $q=1$.On the other hand, we prove that \\eqref{0} remains valid also if one considers the case $q=1$, but it is necessary to require that $u_k$ weakly converges to $u$ in a Zygmund-Sobolev space with a slightly higher degree of regularity than $W^{1,2}(\\Om$ and precisely$$ u_k \\rightharpoonup u \\;\\;\\mbox{weakly in} \\;\\; W^{1,L^2 \\log^\\alpha L}(\\Om$$for some $\\alpha >1$.    

  5. On Some Unwarranted Tacit Assumptions in Cognitive Neuroscience†

    Science.gov (United States)

    Mausfeld, Rainer

    2011-01-01

    The cognitive neurosciences are based on the idea that the level of neurons or neural networks constitutes a privileged level of analysis for the explanation of mental phenomena. This paper brings to mind several arguments to the effect that this presumption is ill-conceived and unwarranted in light of what is currently understood about the physical principles underlying mental achievements. It then scrutinizes the question why such conceptions are nevertheless currently prevailing in many areas of psychology. The paper argues that corresponding conceptions are rooted in four different aspects of our common-sense conception of mental phenomena and their explanation, which are illegitimately transferred to scientific enquiry. These four aspects pertain to the notion of explanation, to conceptions about which mental phenomena are singled out for enquiry, to an inductivist epistemology, and, in the wake of behavioristic conceptions, to a bias favoring investigations of input–output relations at the expense of enquiries into internal principles. To the extent that the cognitive neurosciences methodologically adhere to these tacit assumptions, they are prone to turn into a largely a-theoretical and data-driven endeavor while at the same time enhancing the prospects for receiving widespread public appreciation of their empirical findings. PMID:22435062

  6. In vitro versus in vivo culture sensitivities: an unchecked assumption?

    Directory of Open Access Journals (Sweden)

    Prasad V

    2013-03-01

    Full Text Available No abstract available. Article truncated at 150 words. Case Presentation A patient presents to urgent care with the symptoms of a urinary tract infection (UTI. The urinalysis is consistent with infection, and the urine culture is sent to lab. In the interim, a physician prescribes empiric treatment, and sends the patient home. Two days later, the culture is positive for E. coli, resistant to the drug prescribed (Ciprofloxacin, Minimum Inhibitory Concentration (MIC 64 μg/ml, but attempts to contact the patient (by telephone are not successful. The patient returns the call two weeks later to say that the infection resolved without sequelae.Discussion Many clinicians have the experience of treatment success in the setting of known antibiotic resistance, and, conversely, treatment failure in the setting of known sensitivity. Such anomalies and empiric research described here forces us to revisit assumptions about the relationship between in vivo and in vitro drug responses. When it comes to the utility of microbiology…

  7. Finite Element Simulations to Explore Assumptions in Kolsky Bar Experiments.

    Energy Technology Data Exchange (ETDEWEB)

    Crum, Justin [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-08-05

    The chief purpose of this project has been to develop a set of finite element models that attempt to explore some of the assumptions in the experimental set-up and data reduction of the Kolsky bar experiment. In brief, the Kolsky bar, sometimes referred to as the split Hopkinson pressure bar, is an experimental apparatus used to study the mechanical properties of materials at high strain rates. Kolsky bars can be constructed to conduct experiments in tension or compression, both of which are studied in this paper. The basic operation of the tension Kolsky bar is as follows: compressed air is inserted into the barrel that contains the striker; the striker accelerates towards the left and strikes the left end of the barrel producing a tensile stress wave that propogates first through the barrel and then down the incident bar, into the specimen, and finally the transmission bar. In the compression case, the striker instead travels to the right and impacts the incident bar directly. As the stress wave travels through an interface (e.g., the incident bar to specimen connection), a portion of the pulse is transmitted and the rest reflected. The incident pulse, as well as the transmitted and reflected pulses are picked up by two strain gauges installed on the incident and transmitted bars as shown. By interpreting the data acquired by these strain gauges, the stress/strain behavior of the specimen can be determined.

  8. Cleanup of contaminated soil -- Unreal risk assumptions: Contaminant degradation

    Energy Technology Data Exchange (ETDEWEB)

    Schiffman, A. [New Jersey Department of Environmental Protection, Ewing, NJ (United States)

    1995-12-31

    Exposure assessments for development of risk-based soil cleanup standards or criteria assume that contaminant mass in soil is infinite and conservative (constant concentration). This assumption is not real for most organic chemicals. Contaminant mass is lost from soil and ground water when organic chemicals degrade. Factors to correct for chemical mass lost by degradation are derived from first-order kinetics for 85 organic chemicals commonly listed by USEPA and state agencies. Soil cleanup criteria, based on constant concentration, are then corrected for contaminant mass lost. For many chemicals, accounting for mass lost yields large correction factors to risk-based soil concentrations. For degradation in ground water and soil, correction factors range from greater than one to several orders of magnitude. The long exposure durations normally used in exposure assessments (25 to 70 years) result in large correction factors to standards even for carcinogenic chemicals with long half-lives. For the ground water pathway, a typical soil criterion for TCE of 1 mg/kg would be corrected to 11 mg/kg. For noncarcinogens, correcting for mass lost means that risk algorithms used to set soil cleanup requirements are inapplicable for many chemicals, especially for long periods of exposure.

  9. Stream of consciousness: Quantum and biochemical assumptions regarding psychopathology.

    Science.gov (United States)

    Tonello, Lucio; Cocchi, Massimo; Gabrielli, Fabio; Tuszynski, Jack A

    2017-04-01

    The accepted paradigms of mainstream neuropsychiatry appear to be incompletely adequate and in various cases offer equivocal analyses. However, a growing number of new approaches are being proposed that suggest the emergence of paradigm shifts in this area. In particular, quantum theories of mind, brain and consciousness seem to offer a profound change to the current approaches. Unfortunately these quantum paradigms harbor at least two serious problems. First, they are simply models, theories, and assumptions, with no convincing experiments supporting their claims. Second, they deviate from contemporary mainstream views of psychiatric illness and do so in revolutionary ways. We suggest a possible way to integrate experimental neuroscience with quantum models in order to address outstanding issues in psychopathology. A key role is played by the phenomenon called the "stream of consciousness", which can be linked to the so-called "Gamma Synchrony" (GS), which is clearly demonstrated by EEG data. In our novel proposal, a unipolar depressed patient could be seen as a subject with an altered stream of consciousness. In particular, some clues suggest that depression is linked to an "increased power" stream of consciousness. It is additionally suggested that such an approach to depression might be extended to psychopathology in general with potential benefits to diagnostics and therapeutics in neuropsychiatry. Copyright © 2017 Elsevier Ltd. All rights reserved.

  10. Observing gravitational-wave transient GW150914 with minimal assumptions

    Science.gov (United States)

    Abbott, B. P.; Abbott, R.; Abbott, T. D.; Abernathy, M. R.; Acernese, F.; Ackley, K.; Adams, C.; Adams, T.; Addesso, P.; Adhikari, R. X.; Adya, V. B.; Affeldt, C.; Agathos, M.; Agatsuma, K.; Aggarwal, N.; Aguiar, O. D.; Aiello, L.; Ain, A.; Ajith, P.; Allen, B.; Allocca, A.; Altin, P. A.; Anderson, S. B.; Anderson, W. G.; Arai, K.; Araya, M. C.; Arceneaux, C. C.; Areeda, J. S.; Arnaud, N.; Arun, K. G.; Ascenzi, S.; Ashton, G.; Ast, M.; Aston, S. M.; Astone, P.; Aufmuth, P.; Aulbert, C.; Babak, S.; Bacon, P.; Bader, M. K. M.; Baker, P. T.; Baldaccini, F.; Ballardin, G.; Ballmer, S. W.; Barayoga, J. C.; Barclay, S. E.; Barish, B. C.; Barker, D.; Barone, F.; Barr, B.; Barsotti, L.; Barsuglia, M.; Barta, D.; Bartlett, J.; Bartos, I.; Bassiri, R.; Basti, A.; Batch, J. C.; Baune, C.; Bavigadda, V.; Bazzan, M.; Behnke, B.; Bejger, M.; Bell, A. S.; Bell, C. J.; Berger, B. K.; Bergman, J.; Bergmann, G.; Berry, C. P. L.; Bersanetti, D.; Bertolini, A.; Betzwieser, J.; Bhagwat, S.; Bhandare, R.; Bilenko, I. A.; Billingsley, G.; Birch, J.; Birney, R.; Biscans, S.; Bisht, A.; Bitossi, M.; Biwer, C.; Bizouard, M. A.; Blackburn, J. K.; Blackburn, L.; Blair, C. D.; Blair, D. G.; Blair, R. M.; Bloemen, S.; Bock, O.; Bodiya, T. P.; Boer, M.; Bogaert, G.; Bogan, C.; Bohe, A.; Bojtos, P.; Bond, C.; Bondu, F.; Bonnand, R.; Boom, B. A.; Bork, R.; Boschi, V.; Bose, S.; Bouffanais, Y.; Bozzi, A.; Bradaschia, C.; Brady, P. R.; Braginsky, V. B.; Branchesi, M.; Brau, J. E.; Briant, T.; Brillet, A.; Brinkmann, M.; Brisson, V.; Brockill, P.; Brooks, A. F.; Brown, D. A.; Brown, D. D.; Brown, N. M.; Buchanan, C. C.; Buikema, A.; Bulik, T.; Bulten, H. J.; Buonanno, A.; Buskulic, D.; Buy, C.; Byer, R. L.; Cadonati, L.; Cagnoli, G.; Cahillane, C.; Calderón Bustillo, J.; Callister, T.; Calloni, E.; Camp, J. B.; Cannon, K. C.; Cao, J.; Capano, C. D.; Capocasa, E.; Carbognani, F.; Caride, S.; Casanueva Diaz, J.; Casentini, C.; Caudill, S.; Cavaglià, M.; Cavalier, F.; Cavalieri, R.; Cella, G.; Cepeda, C. B.; Cerboni Baiardi, L.; Cerretani, G.; Cesarini, E.; Chakraborty, R.; Chatterji, S.; Chalermsongsak, T.; Chamberlin, S. J.; Chan, M.; Chao, S.; Charlton, P.; Chassande-Mottin, E.; Chen, H. Y.; Chen, Y.; Cheng, C.; Chincarini, A.; Chiummo, A.; Cho, H. S.; Cho, M.; Chow, J. H.; Christensen, N.; Chu, Q.; Chua, S.; Chung, S.; Ciani, G.; Clara, F.; Clark, J. A.; Clark, M.; Cleva, F.; Coccia, E.; Cohadon, P.-F.; Colla, A.; Collette, C. G.; Cominsky, L.; Constancio, M.; Conte, A.; Conti, L.; Cook, D.; Corbitt, T. R.; Cornish, N.; Corsi, A.; Cortese, S.; Costa, C. A.; Coughlin, M. W.; Coughlin, S. B.; Coulon, J.-P.; Countryman, S. T.; Couvares, P.; Cowan, E. E.; Coward, D. M.; Cowart, M. J.; Coyne, D. C.; Coyne, R.; Craig, K.; Creighton, J. D. E.; Cripe, J.; Crowder, S. G.; Cumming, A.; Cunningham, L.; Cuoco, E.; Dal Canton, T.; Danilishin, S. L.; D'Antonio, S.; Danzmann, K.; Darman, N. S.; Dattilo, V.; Dave, I.; Daveloza, H. P.; Davier, M.; Davies, G. S.; Daw, E. J.; Day, R.; DeBra, D.; Debreczeni, G.; Degallaix, J.; De Laurentis, M.; Deléglise, S.; Del Pozzo, W.; Denker, T.; Dent, T.; Dereli, H.; Dergachev, V.; DeRosa, R. T.; De Rosa, R.; DeSalvo, R.; Dhurandhar, S.; Díaz, M. C.; Di Fiore, L.; Di Giovanni, M.; Di Lieto, A.; Di Pace, S.; Di Palma, I.; Di Virgilio, A.; Dojcinoski, G.; Dolique, V.; Donovan, F.; Dooley, K. L.; Doravari, S.; Douglas, R.; Downes, T. P.; Drago, M.; Drever, R. W. P.; Driggers, J. C.; Du, Z.; Ducrot, M.; Dwyer, S. E.; Edo, T. B.; Edwards, M. C.; Effler, A.; Eggenstein, H.-B.; Ehrens, P.; Eichholz, J.; Eikenberry, S. S.; Engels, W.; Essick, R. C.; Etzel, T.; Evans, M.; Evans, T. M.; Everett, R.; Factourovich, M.; Fafone, V.; Fair, H.; Fairhurst, S.; Fan, X.; Fang, Q.; Farinon, S.; Farr, B.; Farr, W. M.; Favata, M.; Fays, M.; Fehrmann, H.; Fejer, M. M.; Ferrante, I.; Ferreira, E. C.; Ferrini, F.; Fidecaro, F.; Fiori, I.; Fiorucci, D.; Fisher, R. P.; Flaminio, R.; Fletcher, M.; Fournier, J.-D.; Franco, S.; Frasca, S.; Frasconi, F.; Frei, Z.; Freise, A.; Frey, R.; Frey, V.; Fricke, T. T.; Fritschel, P.; Frolov, V. V.; Fulda, P.; Fyffe, M.; Gabbard, H. A. G.; Gair, J. R.; Gammaitoni, L.; Gaonkar, S. G.; Garufi, F.; Gatto, A.; Gaur, G.; Gehrels, N.; Gemme, G.; Gendre, B.; Genin, E.; Gennai, A.; George, J.; Gergely, L.; Germain, V.; Ghosh, Archisman; Ghosh, S.; Giaime, J. A.; Giardina, K. D.; Giazotto, A.; Gill, K.; Glaefke, A.; Goetz, E.; Goetz, R.; Gondan, L.; González, G.; Gonzalez Castro, J. M.; Gopakumar, A.; Gordon, N. A.; Gorodetsky, M. L.; Gossan, S. E.; Gosselin, M.; Gouaty, R.; Graef, C.; Graff, P. B.; Granata, M.; Grant, A.; Gras, S.; Gray, C.; Greco, G.; Green, A. C.; Groot, P.; Grote, H.; Grunewald, S.; Guidi, G. M.; Guo, X.; Gupta, A.; Gupta, M. K.; Gushwa, K. E.; Gustafson, E. K.; Gustafson, R.; Haas, R.; Hacker, J. J.

    2016-06-01

    The gravitational-wave signal GW150914 was first identified on September 14, 2015, by searches for short-duration gravitational-wave transients. These searches identify time-correlated transients in multiple detectors with minimal assumptions about the signal morphology, allowing them to be sensitive to gravitational waves emitted by a wide range of sources including binary black hole mergers. Over the observational period from September 12 to October 20, 2015, these transient searches were sensitive to binary black hole mergers similar to GW150914 to an average distance of ˜600 Mpc . In this paper, we describe the analyses that first detected GW150914 as well as the parameter estimation and waveform reconstruction techniques that initially identified GW150914 as the merger of two black holes. We find that the reconstructed waveform is consistent with the signal from a binary black hole merger with a chirp mass of ˜30 M⊙ and a total mass before merger of ˜70 M⊙ in the detector frame.

  11. A clinically hidden but severely destructive entity

    OpenAIRE

    Rastogi, Khushboo; Verma, Santosh Kumar; Bhushan, Rajarshi

    2013-01-01

    The diagnosis‘ Aggressive Periodontitis’ (AgP), defined by the International workshop for a classification of periodontal diseases and conditions in 1999, refers to the multifactorial, severe and rapidly progressive form of periodontitis, which primarily—but not exclusively—affects younger patients. Direct and indirect bacterial effects influencing the host immune response play a significant part in the aetiology of AgP comparable with chronic periodontitis. In addition to various virulence f...

  12. 78 FR 17744 - Culturally Significant Objects Imported for Exhibition Determinations: “Maya: Hidden Worlds...

    Science.gov (United States)

    2013-03-22

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF STATE Culturally Significant Objects Imported for Exhibition Determinations: ``Maya: Hidden Worlds Revealed... determine that the objects to be included in the exhibition ``Maya: Hidden Worlds Revealed,'' imported...

  13. The Function and the Utilization of Hidden Curriculum in College English Teaching

    Institute of Scientific and Technical Information of China (English)

    张英

    2013-01-01

    Explore the nature of the hidden curriculum, and utilize the positive functions of hidden curriculum with theory on English teaching and psychological linguistics to obtain desirable effects in College English teaching.

  14. Empathy in nursing. Assumptions, practice and its empirical determinants

    Directory of Open Access Journals (Sweden)

    Zarzycka Danuta

    2016-09-01

    Full Text Available Introduction. In the subject literature there were five conceptual dimensions of empathy defined which were specified as a human trait, the basis of professional work, communication process, a manifestation of concern and the special relations. Empathy is the essence of understanding the other person in nursing. The empathic competences have a significant meaning for building caring and therapeutic relations in the work of nurses.

  15. When real life wind speed exceeds design wind assumptions

    Energy Technology Data Exchange (ETDEWEB)

    Winther-Jensen, M.; Joergensen, E.R. [Risoe National Lab., Roskilde (Denmark)

    1999-03-01

    Most modern wind turbines are designed according to a standard or a set of standards to withstand the design loads with a defined survival probability. Mainly the loads are given by the wind conditions on the site defining the `design wind speeds`, normally including extreme wind speeds given as an average and a peak value. The extreme wind speeds are normally (e.g. in the upcoming IEC standard for wind turbine safety) defined as having a 50-year recurrence period. But what happens when the 100 or 10,000 year wind situation hits a wind turbine? Results on wind turbines of wind speeds higher than the extreme design wind speeds are presented based on experiences especially from the State of Gujarat in India. A description of the normal approach of designing wind turbines in accordance with the standards in briefly given in this paper with special focus on limitations and built-in safety levels. Based on that, other possibilities than just accepting damages on wind turbines exposed for higher than design wind speeds are mentioned and discussed. The presentation does not intend to give the final answer to this problem but is meant as an input to further investigations and discussions. (au)

  16. Low-scale gravity mediation in warped extra dimension and collider phenomenology on hidden sector

    Indian Academy of Sciences (India)

    H Itoh; N Okada; T Yamashita

    2007-11-01

    We propose a new scenario of gravity-mediated supersymmetry breaking (gravity mediation) in a supersymmetric Randall-Sundrum model, where the gravity mediation takes place at a low scale due to the warped metric. We investigate collider phenomenology involving the hidden sector field, and find a possibility that the hidden sector field can be produced at the LHC and the ILC. The hidden sector may no longer be hidden.

  17. Coarse-grained hidden entropy production in partially inaccessible quantum jump trajectories

    OpenAIRE

    Frenzel, Max F.; Sagawa, Takahiro

    2016-01-01

    We consider an open quantum system for which only a subset of all possible transitions are accessible, while the remaining ones are hidden from direct observation. Using a modification of the notion of quantum jump trajectories we introduce the coarse-grained hidden entropy, which quantifies the entropy production in the hidden subsystem conditioned on our observations of the visible part. The entropy production consisting of the sum of visible and coarse-grained hidden entropy is shown to sa...

  18. Photoacoustic imaging of hidden dental caries by using a fiber-based probing system

    Science.gov (United States)

    Koyama, Takuya; Kakino, Satoko; Matsuura, Yuji

    2017-04-01

    Photoacoustic method to detect hidden dental caries is proposed. It was found that high frequency ultrasonic waves are generated from hidden carious part when radiating laser light to occlusal surface of model tooth. By making a map of intensity of these high frequency components, photoacoustic images of hidden caries were successfully obtained. A photoacoustic imaging system using a bundle of hollow optical fiber was fabricated for using clinical application, and clear photoacoustic image of hidden caries was also obtained by this system.

  19. B-graph sampling to estimate the size of a hidden population

    NARCIS (Netherlands)

    Spreen, M.; Bogaerts, S.

    2015-01-01

    Link-tracing designs are often used to estimate the size of hidden populations by utilizing the relational links between their members. A major problem in studies of hidden populations is the lack of a convenient sampling frame. The most frequently applied design in studies of hidden populations is

  20. Projecting the future of Canada's population: assumptions, implications, and policy

    Directory of Open Access Journals (Sweden)

    Beaujot, Roderic

    2003-01-01

    Full Text Available After considering the assumptions for fertility, mortality and international migration, this paper looks at implications of the evolving demographics for population growth, labour force, retirement, and population distribution. With the help of policies favouring gender equity and supporting families of various types, fertility in Canada could avoid the particularly low levels seen in some countries, and remain at levels closer to 1.6 births per woman. The prognosis in terms of both risk factors and treatment suggests further reductions in mortality toward a life expectancy of 85. On immigration, there are political interests for levels as high as 270,000 per year, while levels of 150,000 correspond to the long term post-war average. The future will see slower population growth, and due to migration more than natural increase. International migration of some 225,000 per year can enable Canada to avoid population decline, and sustain the size of the labour force, but all scenarios show much change in the relative size of the retired compared to the labour force population. According to the ratio of persons aged 20-64 to that aged 65 and over, there were seven persons at labour force ages per person at retirement age in 1951, compared to five in 2001 and probably less than 2.5 in 2051. Growth that is due to migration more so than natural increase will accentuate the urbanization trend and the unevenness of the population distribution over space. Past projections have under-projected the mortality improvements and their impact on the relative size of the population at older age groups. Policies regarding fertility, mortality and migration could be aimed at avoiding population decline and reducing the effect of aging, but there is lack of an institutional basis for policy that would seek to endogenize population.

  1. Providing security assurance in line with national DBT assumptions

    Science.gov (United States)

    Bajramovic, Edita; Gupta, Deeksha

    2017-01-01

    As worldwide energy requirements are increasing simultaneously with climate change and energy security considerations, States are thinking about building nuclear power to fulfill their electricity requirements and decrease their dependence on carbon fuels. New nuclear power plants (NPPs) must have comprehensive cybersecurity measures integrated into their design, structure, and processes. In the absence of effective cybersecurity measures, the impact of nuclear security incidents can be severe. Some of the current nuclear facilities were not specifically designed and constructed to deal with the new threats, including targeted cyberattacks. Thus, newcomer countries must consider the Design Basis Threat (DBT) as one of the security fundamentals during design of physical and cyber protection systems of nuclear facilities. IAEA NSS 10 describes the DBT as "comprehensive description of the motivation, intentions and capabilities of potential adversaries against which protection systems are designed and evaluated". Nowadays, many threat actors, including hacktivists, insider threat, cyber criminals, state and non-state groups (terrorists) pose security risks to nuclear facilities. Threat assumptions are made on a national level. Consequently, threat assessment closely affects the design structures of nuclear facilities. Some of the recent security incidents e.g. Stuxnet worm (Advanced Persistent Threat) and theft of sensitive information in South Korea Nuclear Power Plant (Insider Threat) have shown that these attacks should be considered as the top threat to nuclear facilities. Therefore, the cybersecurity context is essential for secure and safe use of nuclear power. In addition, States should include multiple DBT scenarios in order to protect various target materials, types of facilities, and adversary objectives. Development of a comprehensive DBT is a precondition for the establishment and further improvement of domestic state nuclear-related regulations in the

  2. Inference with constrained hidden Markov models in PRISM

    DEFF Research Database (Denmark)

    Christiansen, Henning; Have, Christian Theil; Lassen, Ole Torp

    2010-01-01

    A Hidden Markov Model (HMM) is a common statistical model which is widely used for analysis of biological sequence data and other sequential phenomena. In the present paper we show how HMMs can be extended with side-constraints and present constraint solving techniques for efficient inference. De...

  3. Searching for a hidden sector in multiparticle production at LHC

    Directory of Open Access Journals (Sweden)

    Sanchis-Lozano Miguel-Angel

    2016-01-01

    Full Text Available A hidden sector beyond the Standard Model can show up in multiparticle production altering inclusive correlations and factorial cumulants of multiplicity distributions. In this report such a study is advocated with a special emphasis on the searches at LHC.

  4. Education as Text: The Varieties of Educational Hiddenness.

    Science.gov (United States)

    Gordon, David

    1988-01-01

    Using the ideas of Paul Ricoeur and Clifford Geertz, this article develops the notion of education as a "text" and analyzes the "hidden curriculum" of that text as it is read by all members of the society. The hypothesis is proposed that education becomes a text about society's myths and sacred beliefs. (TE)

  5. EVALUASI HIDDEN CURRICULUM DI SMP NEGERI BOJA, KABUPATEN KENDAL

    Directory of Open Access Journals (Sweden)

    Neni Lestari

    2015-12-01

    Full Text Available This study aimed to evaluate the implementation and impact of Hidden Curriculum, as well as the determinant factors of success and sustainability in SMPN 2 Boja Kendal. This study was an evaluative research using qualitative approach. The data collected by using observation, interviews, and documentation. Data analyzed by collecting and selecting to be deduce. Validity used triangulation data that combined the result of observation, interviews, and documentation. The results of the study were: 1 The activities of hidden curriculum development at SMPN 2 Boja Kendal, namely: flag ceremony, school environmental management, establishing and enforcing discipline, special religious worship, smiles, greetings and courtesies, exemplary, relationship among students and principal, teachers, and staff, school canteen services. 2 The impact of the hidden curriculum development was the changing of school community’s behavior being better, created clean and beautiful school environment, the improvement of public trust to the school toward their kids’ education. Development of the hidden curriculum could establish students good character and an optimal achievement as well as a good school culture. 3 Internal supporting factors including: qualified human resources, the availability of school facilities, school environment was clean and beautiful. External supporting factors occur in the form of endorsement of the parents, school committees and communities in establishing good and virtuous character for the students.

  6. Is the Hidden Curriculum a Relevant Issue in Educational Processes

    Directory of Open Access Journals (Sweden)

    Patarroyo Esther

    2004-08-01

    Full Text Available This paper explores some ideas about the hidden curriculum as an amount of ideas and beliefs which are implicit in an indirect way into the scholar life. Those ideas are regarding to gender equality, social status and racial difference, among others. We consider teachers are able to integrate the hidden curriculum as a pedagogical strategy in the classroom. Examples of integration include activities such as observation techniques, role-plays, peer modeling and particularly, the portfolio as a useful tool for reflection which reveals the hidden curriculum. Key words: Hidden Curriculum, Pedagogical Strategy, Portfolio, ELT Processes, Stereotypes Este documento explora algunas ideas acerca del currículo oculto como una suma de ideas y creencias que están implícitos de una forma indirecta dentro de la vida escolar. Estas ideas están relacionadas con la equidad de género, diferencias sociales y raciales, entre otros. Consideramos que es posible para los docentes integrar el currículo como estrategia pedagógica en el aula. Ejemplos de esta integración incluyen técnicas de observación, juegos de roles, modelamiento en parejas y particularmente, el portafolio como herramienta de reflexión que permita hacer evidente el currículo oculto. Palabras claves: Currículo Oculto, Estrategia Pedagógica, Estereotipos, Enseñanza de Inglés, Portafolio

  7. Multistability and hidden attractors in a relay system with hysteresis

    DEFF Research Database (Denmark)

    Zhusubaliyev, Zhanybai T.; Mosekilde, Erik; Rubanov, Vasily G.

    2015-01-01

    For nonlinear dynamic systems with switching control, the concept of a "hidden attractor" naturally applies to a stable dynamic state that either (1) coexists with the stable switching cycle or (2), if the switching cycle is unstable, has a basin of attraction that does not intersect with the nei...

  8. The Hidden Curriculum of Youth Policy: A Dutch Example

    NARCIS (Netherlands)

    Hopman, M.; De Winter, M.; Koops, W.

    2014-01-01

    Youth policy is more than a mere response to the actual behavior of children, but it is equally influenced by values and beliefs of policy makers. These values are however rarely made explicit and, therefore, the authors refer to them as “the hidden curriculum” of youth policy. The study investigati

  9. Searching for hidden sectors in multiparticle production at the LHC

    CERN Document Server

    Sanchis-Lozano, Miguel-Angel

    2016-01-01

    Most signatures of new physics in colliders have been studied so far on the transverse plane with respect to the beam direction. In this work however we study the impact of a hidden sector beyond the Standard Model (SM) on inclusive (pseudo)rapidity correlations and moments of the multiplicity distributions, with special emphasis in the LHC results.

  10. K­MEANS CLUSTERING FOR HIDDEN MARKOV MODEL

    NARCIS (Netherlands)

    Perrone, M.P.; Connell, S.D.

    2004-01-01

    An unsupervised k­means clustering algorithm for hidden Markov models is described and applied to the task of generating subclass models for individual handwritten character classes. The algorithm is compared to a related clustering method and shown to give a relative change in the error rate of as

  11. Hidden symmetry of the quantum Calogero-Moser system

    DEFF Research Database (Denmark)

    Kuzentsov, Vadim b

    1996-01-01

    The hidden symmetry of the quantum Calogero-Moser system with an inverse-square potential is algebraically demonstrated making use of Dunkl's operators. We find the underlying algebra explaining the super-integrability phenomenon for this system. Applications to related multi-variable Bessel...

  12. Thermoelectric generator hidden in a shirt with a fabric radiator

    Science.gov (United States)

    Leonov, Vladimir; Vullers, Ruud J. M.; Hoof, Chris Van

    2012-06-01

    Integration of thermopiles in garments has been performed in this work in different ways. It is shown that textile has a minor effect on power generation, which enables completely hidden and unobtrusive energy harvester. A one-milliwatt thermoelectric generator is then integrated between two layers of a shirt and its characteristics are reported.

  13. Discriminative training of self-structuring hidden control neural models

    DEFF Research Database (Denmark)

    Sørensen, Helge Bjarup Dissing; Hartmann, Uwe; Hunnerup, Preben

    1995-01-01

    This paper presents a new training algorithm for self-structuring hidden control neural (SHC) models. The SHC models were trained non-discriminatively for speech recognition applications. Better recognition performance can generally be achieved, if discriminative training is applied instead. Thus...

  14. Old, New and Hidden Causes of Perioperative Hypersensitivity.

    Science.gov (United States)

    Garvey, Lene Heise

    2016-01-01

    Perioperative hypersensitivity reactions are rare, often life-threatening events, and subsequent investigations to identify the culprit are important to avoid re-exposure. All exposures in the perioperative setting may potentially be the cause of a hypersensitivity reaction, but drugs administered intravenously such as neuromuscular blocking agents (NMBA), induction agents and antibiotics have traditionally been reported to be implicated most commonly. It has recently become apparent that there are geographical differences in sensitization patterns related to variation in exposures, referral patterns and performance and interpretation of investigations. Differences in sensitization to NMBAs are partly explained by cross sensitization to pholcodine, an ingredient in cough-medicines available in some countries. While NMBAs are the most common causes of perioperative hypersensitivity in some countries, this may not necessarily be the case in all countries. New and hidden allergens have emerged as causes of perioperative hypersensitivity such as blue dyes, chlorhexidine and excipients. Detailed knowledge of the events at the time of reaction is necessary to identify potential culprits including rare and hidden allergens. Cooperation between allergists and anaesthetists, or other staff present perioperatively, is often needed to identify hidden or even undocumented exposures. The objectives of this review are to provide an overview of the history of investigation of perioperative hypersensitivity, to describe the differences in causes of perioperative hypersensitivity emerging over time and to increase awareness about the "hidden allergens" in the perioperative setting. Some practical advice on how to approach the patient testing negative on all initial investigations is also included.

  15. Parameter estimation of hidden periodic model in random fields

    Institute of Scientific and Technical Information of China (English)

    何书元

    1999-01-01

    Two-dimensional hidden periodic model is an important model in random fields. The model is used in the field of two-dimensional signal processing, prediction and spectral analysis. A method of estimating the parameters for the model is designed. The strong consistency of the estimators is proved.

  16. Beyond the hidden curriculum: The challenging search for authentic ...

    African Journals Online (AJOL)

    2013-11-01

    Nov 1, 2013 ... [6] It was erroneously assumed that medical students ... hidden curriculum, therefore, demands an authentic and comprehensive enquiry into the concept of human dignity, ... reasoning that underpins the desirable values-based healthcare. ... and highly interpersonal form of teaching and learning that takes.

  17. Hidden conic quadratic representation of some nonconvex quadratic optimization problems

    NARCIS (Netherlands)

    Ben-Tal, A.; den Hertog, D.

    2014-01-01

    The problem of minimizing a quadratic objective function subject to one or two quadratic constraints is known to have a hidden convexity property, even when the quadratic forms are indefinite. The equivalent convex problem is a semidefinite one, and the equivalence is based on the celebrated S-lemma

  18. Recognizing Strokes in Tennis Videos Using Hidden Markov Models

    NARCIS (Netherlands)

    Petkovic, M.; Jonker, W.; Zivkovic, Z.

    2001-01-01

    This paper addresses content-based video retrieval with an emphasis on recognizing events in tennis game videos. In particular, we aim at recognizing different classes of tennis strokes using automatic learning capability of Hidden Markov Models. Driven by our domain knowledge, a robust player segme

  19. A Constraint Model for Constrained Hidden Markov Models

    DEFF Research Database (Denmark)

    Christiansen, Henning; Have, Christian Theil; Lassen, Ole Torp

    2009-01-01

    A Hidden Markov Model (HMM) is a common statistical model which is widely used for analysis of biological sequence data and other sequential phenomena. In the present paper we extend HMMs with constraints and show how the familiar Viterbi algorithm can be generalized, based on constraint solving...

  20. Evolving the Topology of Hidden Markov Models using Evolutionary Algorithms

    DEFF Research Database (Denmark)

    Thomsen, Réne

    2002-01-01

    Hidden Markov models (HMM) are widely used for speech recognition and have recently gained a lot of attention in the bioinformatics community, because of their ability to capture the information buried in biological sequences. Usually, heuristic algorithms such as Baum-Welch are used to estimate...